{"id":18959,"date":"2021-08-11T19:10:20","date_gmt":"2021-08-11T19:10:20","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=18959"},"modified":"2021-08-11T19:10:20","modified_gmt":"2021-08-11T19:10:20","slug":"mobile-malware-threats-and-solutions","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/","title":{"rendered":"Mobile Malware: Threats and Solutions"},"content":{"rendered":"<p>As users have increasingly moved from desktop operating systems to mobile devices as their primary form of computing, cyber attackers have taken notice and malware has followed. While the total volume of mobile malware is a fraction of that created for desktops, it is nonetheless a growing security concern, as more and more high-value and sensitive tasks are performed on mobile devices.<\/p>\n<h2>Mobile malware statistics<\/h2>\n<p>McAfee recently published a <a href=\"https:\/\/www.mcafee.com\/content\/dam\/global\/infographics\/McAfeeMobileThreatReport2021.pdf\">report<\/a> stating that mobile malware infections in the fourth quarter of 2020 surpassed 40 million after steadily climbing earlier in the year. More than 3 million of those attacks represented new types of malware.<\/p>\n<p>Check Point published mobile security <a href=\"https:\/\/blog.checkpoint.com\/2021\/04\/12\/check-points-mobile-security-report-2021-almost-every-organization-experienced-a-mobile-related-attack-in-2020\/\">research<\/a> showing that 46% of respondents experienced employees downloading at least one malicious app during 2020. Another finding was that 97% of organizations dealt with mobile threats that used various attack vectors.<\/p>\n<h2>Types of mobile malware<\/h2>\n<p>There are several different forms of mobile malware, including some that specifically target handheld gadgets.<\/p>\n<ul>\n<li><strong>Adware<\/strong>: Though not all security professionals consider adware malicious, this threat category presents users with unwanted advertisements and may track their activities without consent. Security researchers at Kaspersky <a href=\"https:\/\/securelist.com\/it-threat-evolution-q1-2021-mobile-statistics\/102547\/\">determined<\/a> that it accounted for 61.43% of mobile malware detected in Q1 2021.<\/li>\n<li><strong>Trojans<\/strong>: As is the case on desktop, trojans provide a backdoor, enabling an attacker to execute code or control a device remotely. One such Android malware type <a href=\"https:\/\/blog.zimperium.com\/new-advanced-android-malware-posing-as-system-update\/\">identified<\/a> in early 2021 can gather and exfiltrate data ranging from phone contacts to text messages and browser data while remaining hidden from users.<\/li>\n<li><strong>Keyloggers<\/strong>: Keyloggers, which also sometimes include screenscrapers, sit on a user\u2019s device, logging all keystrokes in an attempt to find valuable information.<\/li>\n<li><strong>Bank trojans<\/strong>: This type of malware is particularly attractive to mobile attackers, as it combines a trojan with a keylogger. In March 2021, security researchers <a href=\"https:\/\/www.threatfabric.com\/blogs\/vultur-v-for-vnc.html\">detected<\/a> a new bank trojan they named Vultur. The team confirmed it has keylogging and screen-recording capabilities.<\/li>\n<li><strong>Ransomware<\/strong>: Though not nearly as common as it is on the desktop,<a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">\u202fransomware\u202f<\/a> is a type of malware that will encrypt a user\u2019s data and hold it for \u201cransom\u201d until the attacker is paid.<\/li>\n<\/ul>\n<h2>How mobile malware infects users<\/h2>\n<p>There are a variety of mechanisms by which different forms of mobile malware infect and exploit mobile devices.<\/p>\n<ul>\n<li><strong>Attacking known vulnerabilities<\/strong>: This is perhaps the most obvious form of attack, when attackers simply go after known issues. The challenge is that not all users can update their mobile operating systems as quickly as attackers put out mobile malware.<\/li>\n<li><strong>Permissions abuse<\/strong>: Different forms of malware (often adware) can get on mobile devices when applications are granted unnecessarily high permission levels. One recent <a href=\"https:\/\/cybernews.com\/privacy\/android-apps-are-asking-for-too-many-dangerous-permissions-heres-how-we-know\/\">investigation<\/a> of the top 1,020 Google Play Store apps found that many asked for potentially dangerous permissions. For example, 77% wanted to read external storage.<\/li>\n<li><strong>Malware preinstalled on phones<\/strong>: Some mobile malware comes on phones out of the box. One report warned how this problem often <a href=\"https:\/\/www.realwire.com\/releases\/Mobile-Malware-Pandemic-with-1-In-6-Android-Phones-Now-Infected\">affects<\/a> developing nations and residents who use low-end devices. It also recently cropped up in the German market when new phones included mobile <a href=\"https:\/\/blog.malwarebytes.com\/android\/2021\/04\/pre-installed-auto-installer-threat-found-on-android-mobile-devices-in-germany\/\">malware<\/a> that could send malicious WhatsApp messages.<\/li>\n<li><strong>Distribution through app stores<\/strong>: The vast majority of malware and malware-integrated apps come from third-party app stores. A 2020 report <a href=\"https:\/\/www.riskiq.com\/wp-content\/uploads\/2021\/01\/RiskIQ-2020-Mobile-App-Threat-Landscape-Report.pdf\">found<\/a> that the Xiaomi app store was the most likely place to come across dangerous mobile apps. More well-known sites \u2014 such as Apple\u2019s App Store and the Google Play Store \u2014 have stringent quality controls, and are less frequently impacted.<\/li>\n<\/ul>\n<h2>Mobile attacks beyond malware<\/h2>\n<p>While malware can often be a payload in a mobile attack, non-malware-based attacks often hit mobile users.<\/p>\n<ul>\n<li><strong>Authentication attacks<\/strong>: Many different types of authentication attacks aim to steal user credentials or trick users into inputting their credentials into a fraudulent web page or app.<\/li>\n<li><strong>Man-in-the-middle (MiTM)<\/strong>: In a MiTM attack, the data stream from the app to the back-end web service is not properly configured for encryption, enabling an attacker to potentially intercept mobile traffic. This type of attack can occur in a Wi-Fi hotspot, for example.<\/li>\n<\/ul>\n<h2>Creating a mobile device policy<\/h2>\n<p>There are several different ways to keep mobile devices and users safe from mobile malware. For organizations, the best approaches often involve implementing a formal Bring Your Own Device (BYOD) or Enterprise Mobility Management (EMM) system.<\/p>\n<p><em>Learn more about BYOD and EMM in the\u202feSecurityPlanet\u202f<a href=\"https:\/\/www.esecurityplanet.com\/mobile\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/\">guide to EMM<\/a>.<\/em><\/p>\n<p>When employers review BYOD device policies with their workforces, the coverage should explain how these devices and their content could pose dangers to a workplace network. Employee awareness helps minimize possible malware infections, whether workers clock in from an employer\u2019s office or at home.<\/p>\n<h2>Educating employees on mobile threats<\/h2>\n<p>There are a few key things employees need to be understood when it comes to mobile malware. Following cybersecurity best practices is a <a href=\"https:\/\/www.neosystemscorp.com\/blog\/neosystems-2021-predictions-cybersecurity-improvements-cant-wait\/\">business necessity<\/a> since it reflects positively on companies and could lead to new customers.<\/p>\n<p>Additionally, while it is possible to become infected with malware via the authorized, official Apple App Store or Google Play, it is significantly less likely. Users can also take precautionary measures to further reduce the risk. Jailbroken or rooted phones and getting software from unknown third-party sources is typically how most mobile malware exploits users.<\/p>\n<p>It\u2019s also useful to tell employees how certain industries may be more at risk for mobile malware than others. A 2020 report showed how three out of four phishing attempts targeting <a href=\"https:\/\/blog.lookout.com\/pharma-report-3-out-of-4-phishing-attacks-attempt-to-deliver-malware\">pharmaceutical employees<\/a> also delivered malware to victims. Additionally, of those attacks, 35% tried to steal credentials.<\/p>\n<h2>Keeping your network safe from mobile malware<\/h2>\n<p>Mobile trojans can be used in some cases to create a zombie botnet that will attack a local network. Just like any other device connected to the network, mobile devices should always be monitored and logged for potentially malicious activities.<\/p>\n<p>Beyond just monitoring, the implementation of a\u202f<a href=\"https:\/\/www.esecurityplanet.com\/products\/network-access-control-solutions\/\">Network Access Control (NAC)\u202fsolution<\/a> that provides both pre-admission and post-admission monitoring of activity is recommended.<\/p>\n<h2>Mobile malware solutions<\/h2>\n<p>Unlike desktop software, which can come from any source, the default (and recommended) method to acquire mobile software is via an authorized app store. Both Apple and Google scan all applications in their respective app stores to detect any potentially malicious apps. Going a step further, Google Play Protect is a feature that periodically checks users\u2019 phones for malware and alerts them.<\/p>\n<p>Mobile malware solutions, much like their desktop counterparts, do anti-virus and anti-spyware\/adware scanning. Some provide additional scanning to prevent or limit the risk of phishing, and some provide permissions warnings when an app is attempting to do something that requires more permissions than it should.<\/p>\n<p>These are some of the vendors offering mobile security software and solutions:<\/p>\n<ul>\n<li>AVG Antivirus<\/li>\n<li>Kaspersky<\/li>\n<li>Eset<\/li>\n<li>Norton Security<\/li>\n<li>McAfee Mobile Security<\/li>\n<li>Bitdefender<\/li>\n<li>Malwarebytes<\/li>\n<li>Fortinet<\/li>\n<li>Avast<\/li>\n<li>Comodo Cybersecurity<\/li>\n<li>BullGuard<\/li>\n<li>IBM Security<\/li>\n<li>Sophos<\/li>\n<li>Lookout<\/li>\n<\/ul>\n<h2>Start fighting back against mobile malware<\/h2>\n<p>This overview emphasizes why mobile malware is a growing threat. Fortunately, IT professionals can successfully manage the risks by remaining aware of attack methods and taking proactive measures against them.<\/p>\n\n\n<div id=\"ta-campaign-widget-66d6f2d42b6e0-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f2d42b6e0\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f2d42b6e0\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f2d42b6e0\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f2d42b6e0\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f2d42b6e0\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f2d42b6e0\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>As users have increasingly moved from desktop operating systems to mobile devices as their primary form of computing, cyber attackers have taken notice and malware has followed. While the total volume of mobile malware is a fraction of that created for desktops, it is nonetheless a growing security concern, as more and more high-value and [&hellip;]<\/p>\n","protected":false},"author":263,"featured_media":18824,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[18],"tags":[1146],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[140,303,285,286],"class_list":["post-18959","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile","tag-malware","b2b_audience-awareness-and-consideration","b2b_product-mobile","b2b_product-mobile-malware","b2b_product-mobile-operating-systems","b2b_product-mobile-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Mobile Malware: Threats and Solutions | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"As users have increasingly moved from desktop operating systems to mobile devices as their primary form of computing, cyber attackers have taken notice\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Malware: Threats and Solutions | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"As users have increasingly moved from desktop operating systems to mobile devices as their primary form of computing, cyber attackers have taken notice\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-11T19:10:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/email-spoofing.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"933\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Devin Partida\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Devin Partida\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/\"},\"author\":{\"name\":\"Devin Partida\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/f30aed096140e77101ea19742c0d8f08\"},\"headline\":\"Mobile Malware: Threats and Solutions\",\"datePublished\":\"2021-08-11T19:10:20+00:00\",\"dateModified\":\"2021-08-11T19:10:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/\"},\"wordCount\":1146,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/email-spoofing.jpeg\",\"keywords\":[\"malware\"],\"articleSection\":[\"Mobile\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/\",\"name\":\"Mobile Malware: Threats and Solutions | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/email-spoofing.jpeg\",\"datePublished\":\"2021-08-11T19:10:20+00:00\",\"dateModified\":\"2021-08-11T19:10:20+00:00\",\"description\":\"As users have increasingly moved from desktop operating systems to mobile devices as their primary form of computing, cyber attackers have taken notice\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/email-spoofing.jpeg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/email-spoofing.jpeg\",\"width\":1400,\"height\":933,\"caption\":\"Business person reading emails on smartphone and laptop computer screen. Meant to symbolize the threat of email spoofing.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Malware: Threats and Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/f30aed096140e77101ea19742c0d8f08\",\"name\":\"Devin Partida\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Devin-7-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Devin-7-150x150.jpg\",\"caption\":\"Devin Partida\"},\"description\":\"Devin Partida is a technology and cybersecurity writer whose work has been featured on Entrepreneur, AOL, AT&amp;T's cybersecurity blog and Yahoo! Finance. She is also the Editor-in-Chief of the tech website ReHack.com.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/dpartida\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobile Malware: Threats and Solutions | eSecurity Planet","description":"As users have increasingly moved from desktop operating systems to mobile devices as their primary form of computing, cyber attackers have taken notice","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/","og_locale":"en_US","og_type":"article","og_title":"Mobile Malware: Threats and Solutions | eSecurity Planet","og_description":"As users have increasingly moved from desktop operating systems to mobile devices as their primary form of computing, cyber attackers have taken notice","og_url":"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/","og_site_name":"eSecurity Planet","article_published_time":"2021-08-11T19:10:20+00:00","og_image":[{"width":1400,"height":933,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/email-spoofing.jpeg","type":"image\/jpeg"}],"author":"Devin Partida","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Devin Partida","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/"},"author":{"name":"Devin Partida","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/f30aed096140e77101ea19742c0d8f08"},"headline":"Mobile Malware: Threats and Solutions","datePublished":"2021-08-11T19:10:20+00:00","dateModified":"2021-08-11T19:10:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/"},"wordCount":1146,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/email-spoofing.jpeg","keywords":["malware"],"articleSection":["Mobile"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/","url":"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/","name":"Mobile Malware: Threats and Solutions | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/email-spoofing.jpeg","datePublished":"2021-08-11T19:10:20+00:00","dateModified":"2021-08-11T19:10:20+00:00","description":"As users have increasingly moved from desktop operating systems to mobile devices as their primary form of computing, cyber attackers have taken notice","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/email-spoofing.jpeg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/email-spoofing.jpeg","width":1400,"height":933,"caption":"Business person reading emails on smartphone and laptop computer screen. Meant to symbolize the threat of email spoofing."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Mobile Malware: Threats and Solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/f30aed096140e77101ea19742c0d8f08","name":"Devin Partida","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Devin-7-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Devin-7-150x150.jpg","caption":"Devin Partida"},"description":"Devin Partida is a technology and cybersecurity writer whose work has been featured on Entrepreneur, AOL, AT&amp;T's cybersecurity blog and Yahoo! Finance. She is also the Editor-in-Chief of the tech website ReHack.com.","url":"https:\/\/www.esecurityplanet.com\/author\/dpartida\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18959"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/263"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=18959"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18959\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/18824"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=18959"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=18959"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=18959"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=18959"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=18959"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=18959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}