ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Virus Infections on Smartphones in the EU - Coming to the U.S. Soon

Updated on February 14, 2011

Report from the Eruopean Union

February 9, 2011

In a report from the European Union Office of Statistics certain countries suffer more from computer virus attacks than others. The report also included a list of countries with the lowest incidents of computer viral attack.

The survey was conducted in thirty countries with a sampling of over two hundred thousand computers users. Despite having anti-virus software installed the worse affected countries were Bulgaria and Hungary. Austria and Ireland had the least number of incedents.

The report also revealed that about three (3%) of Eruopean users were victims of Phishing attacks. Phishing involves using fake websites to lure people into revealing details such as bank accounts or login names.

Latvia had the highest number of recorded attacks at eight (8%) closely followed by England with seven (7%) percent.

Malta & Austria each had five (5%) percent.

Computer Virus Infections by Country
Computer Virus Infections by Country | Source

McAfee Report

Much of the malware targeting smartphones was spread via PDFs and Flash software, Mcafee said.

Mcafee, the company that writes anti-viral software, reported that in the fourth quarter threat report that the company has seen a forty-six (46%) percent increase in malware attacks targeting smartphones.

The report goes on to suggest that since smartphones are becoming more widespread than PCs, attacks are increasingly targeting these devices. This makes some sense because manufacturers claim to have shipped over one hundred (100,000,000) million smartphones globally in the forth-quarter of 2010.

At that same time Infections targeting computers hit fifty million.

Adaptive Mobile Dublin

Adaptive Mobile, a company out of Ireland, predicts that smartphone attacks will increase resulting in financial loss to both the carrier and the smartphone user.

The problem is that many users store financial data (bank, credit card, etc.) on their smartphones. Concerted attacks on these devices leave the user vulnerable to having vital financial information ciphered electronically and then used in identity theft scams. Malware can be programmed to record keystrokes including login information and passwords, and then transmit that information to predetermined numbers.

With thirty-seven (37%) of Europe and forty-four (44%) percent of the United States projected to be using smartphones this year these figures are quite alarming.

Other Scams
An SMS text message is received. When the smartphone user replies a particular phone number is engaged which bills at $4.00 per minute. As the user continues to try to send messages to this number charges rack up and come due when the bill arrives.

Often consumers hit with these charges refuse to pay leaving the carrier to foot the bill. Mobile operators have lost up to a million dollars to this scam.

As these scam continue both the consumer and provider will begin to lose trust in one another.

Four Types of Attacks

There are four basic types of attacks on smartphones that consumers should be aware of. These are:

  • Advanced mobile malware: First identified in October 2010, this attack monitors mobile users access to bank accounts and harvests login and passwords and then sends that information to the thief
  • Converged messaging spam: 411 (information) spam attacks involve the user receiving an SMS message and prompting for a reply; the reply is where the money is charged if the reply to phone number has a high dollar per minute rate
  • IP reputation: SMS and email spam is on the rise; this results in mobile devices becoming infected with PC malware included in email messages
  • Credit attacks: Messages are sent encouraging the user to dial a premium number resulting in high per minute billing rates

Next Generation Smartphones and Attack

The iPhone 5, rumored to have Near Field Communications (NFC), is an example of smartphones with increased connectivity to sensitive date.  NFC allows a cellular device to communicate and exchange data with devices within 10 centimeters. These near field devices might include payment kiosks, debit card terminals, and other payment terminals.

Since the phone must have some of the sensitive financial data on it to process payments hacking into these devices will be high on the list of potential thieves.

Coda

After years of protecting both home and office computers viral attacks are now reaching into new territory; the smartphone.

Users need to be aware of these threats and refuse to respond to suspicious SMS text messages and email.

Disclaimer

The author was not compensated in any way, monetarily, with discounts, or freebies by any of the companies mentioned.

Though the author does make a small profit for the word count of this article none of that comes directly from the manufacturers mentioned. The author also stands to make a small profit from advertising attached to this article.

The author has no control over either the advertising or the contents of those ads.

Comments

Submit a Comment

  • profile image

    Nan 

    7 years ago

    I hope that I dond't pick up any virus on my compyuter. Thanks for the information.

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://hubpages.com/privacy-policy#gdpr

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)