Most Operating System (OS) providers will ensure that they publish sufficient technical information – to enable legitimate programmers to write applications that run on the OS. However, this same documentation can also be used by malware creators, in order to develop computer viruses, worms and Trojans that attack computers that are running the OS.
At the beginning of the 2000s, most manufacturers of mobile phones did not disclose this level of technical information. This meant that it was not possible for software developers to create programs for the devices – or for hackers and cybercriminals to develop malware that targeted the manufacturer’s phones.
As mobile devices began to adopt technologies such as Java – and also with the development of smartphones – legitimate programmers were given access to the level of detailed documentation that is essential for the development of mobile applications. Unfortunately, that documentation has also been exploited by malware creators – in order to create cyber threats that target a specific device or OS.
To discover the other factors that enable malware to thrive and survive, please click the following links:
Learn more about how Malware Creators exploit manufacturers' technical information in order to create targeted cyber attacks.