Risk
7/21/2008
09:30 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Has The Time Arrived For iPhone Antivirus Software?

Apple antivirus and privacy software maker Intego thinks so. The security vendor last week announced its software is the first AV to scan the iPhone and iPod Touch for malware. I wouldn't rush out to install it, just yet.

Apple antivirus and privacy software maker Intego thinks so. The security vendor last week announced its software is the first AV to scan the iPhone and iPod Touch for malware. I wouldn't rush out to install it, just yet.There's no doubt, in my mind, that someday malware on mobile devices will become a problem. Actually, I had thought it would have become a problem earlier this decade, and then again a few years into this decade. But viruses and malware aimed at handheld devices and smartphones just haven't come to fruition. And why should they? Hacking applications and operating systems have grown from being a hobbyist-sport to big business, and there's still little sense (aside from proof-of-concept code and bragging rights) in infecting gadgets when there are so many Web servers and networked PCs available for the taking. (The weakness in this logic is that someone develops some type of virus for the iPhone to cause mass disruption -- just so they have the bragging rights as the one who made history.)

But it's my hunch, and that's as good as anyone can get when it comes to predicting future trends in malware, that such a virus attack would not come via the iPhone/iPod Touch App Store. Rather, it'd come through the mail client or Safari. Which brings us to the utility in Intego's announcement that it's VirusBarrier X5 will eradicate malware from the iPhone and iPod Touch.

From the press release:

Not only Macs are at risk from malware; now that users can install applications on the iPhone and iPod Touch, these devices are open to attack as well.

It's possible -- I mean, viruses have been shipped with retail software packages, MP3 players, and most recently a handful of digital picture frames -- but it's not a risk I'd get all choked up about. Also, because VirusBarrier scans the iPhone and iPod Touch when docked (there is no AV agent placed on the devices) users are still at risk through the most likely attack vectors: Web and mail.

Intego makes good software, and I run its firewall on my Mac Pro and MacBook Pro, but I wouldn't buy VirusBarrier X5 because it scans iPhones and the iPod Touch. The good news for current VirusBarrier X5 users is that the update is free.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5314
Published: 2014-11-23
Buffer overflow in Cybozu Office 9 and 10 before 10.1.0, Mailwise 4 and 5 before 5.1.4, and Dezie 8 before 8.1.1 allows remote authenticated users to execute arbitrary code via e-mail messages.

CVE-2014-5325
Published: 2014-11-23
The (1) DOMConverter, (2) JDOMConverter, (3) DOM4JConverter, and (4) XOMConverter functions in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allow remote attackers to read arbitrary files via DOM data containing an XML external entity declaration in conjunction with an entity refe...

CVE-2014-5326
Published: 2014-11-23
Cross-site scripting (XSS) vulnerability in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CVE-2014-6477
Published: 2014-11-23
Unspecified vulnerability in the JPublisher component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2014-4290, CVE-2014-4291, CVE-2014-4292, CVE-2014-4...

CVE-2014-4807
Published: 2014-11-22
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?