the operating system, and the result is thatthe telephone cannot be restartedd)
Trojan.SymbOS.Hoblle replaces the systemapplication File Explorer with a damagedonee)
Trojan.SymbOS.Appdiasbaler andTrojan.SymbOS.Doombot are functionallyidentical to Trojan.SymbOS.Dampig (thesecond of these installsWorm.SymbOS.Comwar)f)
Trojan.SymbOS.Blankfont is practicallyidentical to Trojan.SymbOS.FontalThe stream of uniform Trojans was broken only byWorm.SymbOS.Lascon in January 2005. Thisworm is a distant relative of Worm.SymbOS.Cabir.It differs from its predecessor in that it can infectSIS files. And in March 2005Worm.SymbOS.Comwar brought new functionalityto the mobile malware arena - this was the firstmalicious program with the ability to propagate viaMMS.
4. Possible Protection Techniques
Mobile has security vulnerabilities like computerand network. There is no particular locking systemor guarding system that is able to ensure 100percent security. Conversely, there are varioustypes of security locks or guards that are suitablefor different situations. We can make use of thecombination of available and up to datetechnologies to fight the serious attacks. Yet thereis no guaranty that this option will provide 100percent security, nevertheless, this methodologycertainly maximizes the mobile security and it isoften possible to stop a threat. Few techniques aredocumented here which are also suggested by Wi-Fi Planet, 2007; TechRepublic, 2008; andTechGuru, 2010.
Enable SIM, device and access lock frommobile settings. Enable the periodic lockdownfeature. Enable the memory access code.
Think deeply before accessing any internet siteand installing any application.
Spend little bit more time to check theapplication through Google or any searchengine before downloading or installingunknown files.
Disable WLAN and Bluetooth when you areout door and when you are not using it.
Find a phone with the service option toremotely kill it when it is irretrievably lost.
Never let others access your phone. Be carefulwhile accepting calls or messages fromunknown numbers.
Enable WPA2 encryption for WLANconnection and pass code request feature forBluetooth connection.
If you noticed that your phone has connectedto GPRS, UMTS, and HSDPA, disable thoseinstantly.
Keep regular backup.
Install antivirus software.
Do not simply save sensitive information onthe phone unless absolutely essential.
5. Trends and forecasts
It is difficult to forecast the evolution of mobileviruses with any accuracy. This area is constantlyin a state of instability. The number of factorswhich could potentially provoke seriousinformation security threats is increasing morequickly than the environment - both technologicaland social - is adapting and evolving to meet thesepotential threats.The following factors will lead to an increase in thenumber of malicious programs and to an increase inthreats for smartphones overall:
The percentage of smartphones in use isgrowing. The more popular the technology, themore profitable an attack will be.
Given the above, the number of people whowill have a vested interested in conducting anattack, and the ability to do so, will alsoincrease.
Smartphones are becoming more and morepowerful and multifunctional, and beginning tosqueeze PDAs out of the market. This willoffer both viruses and virus writers morefunctionalities to exploit.
An increase in device functionality naturallyleads to an increase in the amount of information which is potentially interesting toa remote malicious user that isstored on thedevice. In contrast to standard mobile phones,which usually have little more than an addressbook stored on them, a smartphone memorycan contain any files which would normally bestored on a computer hard disk. Programswhich give access to password protected onlineservices such as ICQ can also be used onsmartphones, which places confidential data atrisk.
(IJCSIS) International Journal of Computer Science and Information Security,Vol. 9, No. 10, October 201196http://sites.google.com/site/ijcsis/ISSN 1947-5500