• Attacks on mobile devices: why so popular?

    In 2017, our products for mobile devices detected attacks on five million users, and the daily stream of new mobile malware keeps growing. Mobile devices are popular targets for a cyberattack for several reasons:

    • More people go mobile, storing more of their valuable data on devices. A hacked device is also a gate for accessing user’s data in the cloud.
    • Mobile users actively engage in social networks and are easier to manipulate via social engineering.
    • Misconfiguration of public Internet access points makes online devices vulnerable to Wi-Fi hotspot-based network attacks that steal the data users send to the Internet.
    • Mobile banking-related data is also a profitable attack target.
    • The spread of BYOD and practices of using the same device for business and personal means makes corporate mobile users a promising target for business espionage.

    URL filtering: protection from accessing bad URLs

    One kind of attack on a mobile device is convincing a user to go to a bad web link, initiate the download and install the malware. Kaspersky Internet Security for Android and Kaspersky Safe Browser for iOS prevent users from accessing URLs with a bad reputation. Kaspersky QR Scanner checks the reputation of URLs in QR codes. The URL reputation is checked online, in the KSN cloud.

    Anti-malware: protection from malware execution

    In iOS, device protection from malware execution is based on the fact that the OS allows the installation of apps only from the App Store, which is strictly moderated by Apple. However, new malware that is able to sidestep this protection keeps emerging.

    Making a classical antimalware app for iOS is not allowed by the OS design: apps cannot scan memory from another app or device. But the combination of Apple’s approach to App Store moderation with protection from accessing bad URLs is a good cybersecurity strategy for iOS.

    On Android devices, users can install files from a variety of sources and app markets. Kaspersky Internet Security for Android scans an app when the app installer file appears in a file storage (even if the file gets to the device via Bluetooth connection or is copied via a USB cable, it gets scanned), and also after the app is installed. The file scan involves detection in the KSN cloud and by local antimalware bases.

    VPN: protection against data interception

    The Kaspersky Secure Connection app protects against attacks by traffic interception from rogue Wi-Fi hotspots and proximate connection infrastructure by building an encrypted virtual private network (VPN) tunnel.

    Kaspersky Lab’s VPN is adaptive. It can automatically enable VPN protection in sensitive contexts: connecting via a vulnerable hotspot (e.g. with weak encryption), accessing a URL or using an app related to sensitive data. Data seen as sensitive is that related to finance, banking, social media, shopping. In assessing hotspots, URLs and apps, Kaspersky Secure Connection relies on their locally available features as well as on cloud reputation.

    Anti-theft: physical theft counteraction for Android          

    Physical theft is a way to access data on a device (photos, videos, personal and corporate documents, addresses) or even use a device as a portal for accessing corporate IT infrastructure. The anti-theft component in Kaspersky Lab mobile protection apps helps you to respond to device theft:

    • You can remotely wipe data and reset the device to factory defaults.
    • The device gets blocked if the thief inserts a new SIM card.
    • You get assistance in finding the device by locating it via the Kaspersky web portal and silently taking the thief’s photo.

    Password and sensitive data protection

    The Kaspersky Password Manager app allows users to enable strong unique passwords in web services and apps they use. This secures users from losing access due to attacks against weak passwords. The app automatically fills passwords in web pages, so you don’t need to fill logon forms by manual copying. Along with logon data, the app stores credit card data, important photos and other sensitive information.

    Security for business (MTD)

    The presence of many mobile devices in corporate environment creates mobile-specific cyberattack vectors on a company. To counter that, companies implement Mobile Threat Defense (MTD) solutions.

    MTD protects company IT system from threats on mobile platforms: at the device, network and application level. It provides protection by preventing, detecting and remediating attacks. MTD is an additional layer of cyber protection over individual device protection tools like those we’ve discussed above.

    Kaspersky Security for Mobile, an MTD solution for corporate mobile user protection, provides:

    • Threat management and protection: Real-time antimalware protection, web URL filtering and other individual device protection features
    • Security policy assigning, compliance monitoring and violation response: Application management, jailbreak/root detect, remote wipe etc.
    • Addition of security to existing third-party enterprise mobile management (EMM) solutions

Related Products

EP 2750069 B1

Method and system for detecting malware using isolated environment

Read more

EP 2750350 A1

System and method for deploying preconfigured software

Read more

EP 2784715 B1

System and method for adaptive modification of antivirus databases

Read more

US 9553889 B1

System and method of detecting malicious files on mobile devices

Read more

2606556 (RUS)

Method of entering confidential data

Read more

CN 102799827 A

Data effective protection of mobile device

Read more

2601147 (RUS)

System and method of detecting targeted attacks

Read more

US 9386031 B2

System and method for detection of targeted attacks

Read more

2592387 (RUS)

Method and system for determining trusted wireless Internet access points by a device

Read more

EP 2819055 A1

System and method for detecting malicious software using malware trigger scenarios

Read more

US 9244671 B2

System and method for deploying preconfigured software

Read more

US 9230106 B2

System and method for detecting malicious software using malware trigger scenarios in a modified computer environment

Read more

US 9147069 B2

System and method for protecting computer resources from unauthorized access using isolated environment

Read more

US 9098697 B2

System and method for detecting malware using isolated environment

Read more

EP 2551786 B1

Efficient securing of data on mobile devices

Read more

US 9003544 B2

Efficient securing of data on mobile devices

Read more

US 8978141 B2

System and method for detecting malicious software using malware trigger scenarios

Read more

US 8631492 B2

Dynamic management of resource utilization by an antivirus application

Read more

2450333 (RUS)

Method of personal data protection on a mobile device

Read more

CN 201821502 U

Information device with security structure capable of being configured dynamically

Read more

US 7607174 B1

Adaptive security for portable information devices

Read more

Skygofree: Following in the footsteps of HackingTeam

Read more

Jack of all trades

Read more

Still Stealing

Read more

Android commercial spyware

Read more

Booking a Taxi for Faketoken

Read more

WAP-billing Trojan-Clickers on rise

Read more

A new era in mobile banking Trojans

Read more

Ztorg: from rooting to SMS

Read more

Mobile malware evolution 2016

Read more

Dvmap: the first Android malware with code injection

Read more

Ztorg: money for infecting your smartphone

Read more

Switcher: Android joins the ‘attack-the-router’ club

Read more

Banking Trojan, Gugi, evolves to bypass Android 6 protection

Read more

Good morning Android!

Read more

Attack on Zygote: a new twist in the evolution of mobile threats

Read more

SMS Trojan bypasses CAPTCHA

Read more

More about corporate scenarios

Read more

BotConf 2018

Whose phone is in your pocket?

by Mikhail Kuzin and Nikita Buchka
Read more

RSA 2018

Hey Android, Where Is My Car?

by Victor Chebyshev
Read more

CARO 2017

How to get money for infecting and rooting your own Android device

by Roman Unuchek
Read more

Independent Benchmark Results

Related Technologies

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.

Accept and Close