Categorieën: Alle - malware - bluetooth - android

door Salvatore La Rosa 1 jaar geleden

164

MOBILE MALWARE

Malicious software specifically targeting mobile devices such as smartphones, tablets, and PDAs can come in various forms. One example is Ghost Push, which infects Android operating systems by gaining root access, consuming system resources, and draining the battery.

MOBILE MALWARE

MOBILE MALWARE

MALWARE IN COMPUTER DEVICES

TROJAN HORSE
INTO SEEMINGLY ATTRACTIVE AND NON-MALICIOUS EXECUTABLE FILES OR APPS THAT ARE DOWNLOADED INTO THE DEVICE AND EXECUTED BY THE USER
WORM
MAY BE TRASMITTED VIA TEXT MESSAGES (SMS OR MMS) AND TYPICALLY DOES NOT REQUIRE THE USER'S INTERACTION FOR EXECUTION
SPYWARE
MONITORS THE SYSTEM AND SYNCHRONISES WITH CALENDARS, EMAIL ACCOUNTS, NOTES AND ANY OTHER SOURCE OF INFORMATION TO SEND DATA TO A MALICIOUS SERVER

THAT OF CAUSING THE COLLAPSE OF THE SYSTEM OR STEALPERSONAL INFORMATION STORED ON THE SAME DEVICES

MOBILE SPECIFIC MALWARE

EXPANDER
TARGETS MOBILE METERS FOR ADDITIONAL PHONE BILLING AND PROFITS IN A WAY THAT IS SIMILAR TO THE ONES USED BY DIALLERS WITH COMPUTERS
GHOST PUSH
INFECTS THE ANDROID O/S BY AUTOMATICALLY GAINING ROOT ACCESS. IT HOGS ALL SYSTEM RESOURCES MAKING IT UNRESPONSIVE AND DRAINS THE BATTERY

BLUETOOTH HACKING

BLUEJACKING
A HACKER SEARCHES FOR DISCOVERABLE DEVICES IN THE AREA AND THEN SENDS SPAM IN THE FORM OF TEXT MESSAGES TO THE DEVICE
BLUEBUGGING
AN ATTACK TO GAIN TOTAL ACCESS AND CONTROL OF A DEVICE. THE HACKER CAN ACCESS ALL THE INFORMATION ON THE SMARTPHONE, INCLUDING PHOTOS, APPS, CONTACTS
BLUESNARFING
HACKERS CAN PURCHASE SOFTWARE TO ALLOW THEM TO REQUEST INFORMATION FROM USER'S DEVICES

MALICIOUS SOFTWARE DESIGNED TO TARGET MOBILE DEVICE SYSTEMS (SMARTPHONE, TABLET OR PDA)