Risk
7/21/2008
09:30 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Has The Time Arrived For iPhone Antivirus Software?

Apple antivirus and privacy software maker Intego thinks so. The security vendor last week announced its software is the first AV to scan the iPhone and iPod Touch for malware. I wouldn't rush out to install it, just yet.

Apple antivirus and privacy software maker Intego thinks so. The security vendor last week announced its software is the first AV to scan the iPhone and iPod Touch for malware. I wouldn't rush out to install it, just yet.There's no doubt, in my mind, that someday malware on mobile devices will become a problem. Actually, I had thought it would have become a problem earlier this decade, and then again a few years into this decade. But viruses and malware aimed at handheld devices and smartphones just haven't come to fruition. And why should they? Hacking applications and operating systems have grown from being a hobbyist-sport to big business, and there's still little sense (aside from proof-of-concept code and bragging rights) in infecting gadgets when there are so many Web servers and networked PCs available for the taking. (The weakness in this logic is that someone develops some type of virus for the iPhone to cause mass disruption -- just so they have the bragging rights as the one who made history.)

But it's my hunch, and that's as good as anyone can get when it comes to predicting future trends in malware, that such a virus attack would not come via the iPhone/iPod Touch App Store. Rather, it'd come through the mail client or Safari. Which brings us to the utility in Intego's announcement that it's VirusBarrier X5 will eradicate malware from the iPhone and iPod Touch.

From the press release:

Not only Macs are at risk from malware; now that users can install applications on the iPhone and iPod Touch, these devices are open to attack as well.

It's possible -- I mean, viruses have been shipped with retail software packages, MP3 players, and most recently a handful of digital picture frames -- but it's not a risk I'd get all choked up about. Also, because VirusBarrier scans the iPhone and iPod Touch when docked (there is no AV agent placed on the devices) users are still at risk through the most likely attack vectors: Web and mail.

Intego makes good software, and I run its firewall on my Mac Pro and MacBook Pro, but I wouldn't buy VirusBarrier X5 because it scans iPhones and the iPod Touch. The good news for current VirusBarrier X5 users is that the update is free.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

CVE-2014-2716
Published: 2014-12-19
Ekahau B4 staff badge tag 5.7 with firmware 1.4.52, Real-Time Location System (RTLS) Controller 6.0.5-FINAL, and Activator 3 reuses the RC4 cipher stream, which makes it easier for remote attackers to obtain plaintext messages via an XOR operation on two ciphertexts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.