0
5.0kviews
Mobile - Viruses
1 Answer
1
237views

A mobile virus is similar to a computer virus that targets mobile phone data or applications/software installed in it. Virus attacks on mobile devices are no longer an exception or proof-of-concept nowadays. In total, 40 mobile virus families and more than 300$(+)$ mobile viruses have been identified. First mobile virus was identified in 2004 and it was the beginning to understand that mobile devices can act as vectors to enter the computer network.

Mobile viruses get spread through two dominant communication protocols - Bluetooth and MMS. Bluetooth virus can easily spread within a distance of $10-30 \mathrm{m}$ , through Bluetooth-activated phones whereas MMS virus can send a copy of itself to all mobile users whose numbers are available in the infected mobile phone's address book.

It is interesting to note that, like Computer Virus Hoax, variants of Mobile Phone Virus Hoax" have been circulating since ,1999. These hoax messages either will be sent through E-Mail or through SMS to the mobile users, The example of such hoax is given.

"All mobile users pay attention!!!!!

If you receive a phone call and your mobile phone displays (XALAN) on the screen don't answer the call. END THE CALL IMMEDIATELY, if you answer the call. your phone will be infected by a virus. This virus WILL ERASE all IMEI and IMSI information from both your phone and your SIM card, which will make your phone unable to connect with the telephone network. You will have to buy a new phone. This information has been confirmed by both Motorola and Nokia. There are over 3 Million mobile phones being infected by this virus in all around the world now. You can also check this news in the CNN website.

PLEASE FORWARD THIS PIECE OF INFORMATION TO ALL YOUR FRIENDS HAVING A MOBILE PHONE"

How to Protect from Mobile Malwares Attacks

Following are some tips to protect mobile from mobile malware attacks:

  • Download or accept programs and content (including ring tones, games, video clips and photos) only from a trusted source.
  • If a mobile is equipped with Bluetooth, turn it OFF or set it to non-discoverable mode when it is not in use and/or not required to use.
  • If a mobile is equipped with beam (i.e., IR), allow it to receive incoming beams, only from the trusted source.
  • Download and install antivirus software for mobile devices.
Please log in to add an answer.