Risk
7/21/2008
09:30 PM
George V. Hulme
George V. Hulme
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Has The Time Arrived For iPhone Antivirus Software?

Apple antivirus and privacy software maker Intego thinks so. The security vendor last week announced its software is the first AV to scan the iPhone and iPod Touch for malware. I wouldn't rush out to install it, just yet.

Apple antivirus and privacy software maker Intego thinks so. The security vendor last week announced its software is the first AV to scan the iPhone and iPod Touch for malware. I wouldn't rush out to install it, just yet.There's no doubt, in my mind, that someday malware on mobile devices will become a problem. Actually, I had thought it would have become a problem earlier this decade, and then again a few years into this decade. But viruses and malware aimed at handheld devices and smartphones just haven't come to fruition. And why should they? Hacking applications and operating systems have grown from being a hobbyist-sport to big business, and there's still little sense (aside from proof-of-concept code and bragging rights) in infecting gadgets when there are so many Web servers and networked PCs available for the taking. (The weakness in this logic is that someone develops some type of virus for the iPhone to cause mass disruption -- just so they have the bragging rights as the one who made history.)

But it's my hunch, and that's as good as anyone can get when it comes to predicting future trends in malware, that such a virus attack would not come via the iPhone/iPod Touch App Store. Rather, it'd come through the mail client or Safari. Which brings us to the utility in Intego's announcement that it's VirusBarrier X5 will eradicate malware from the iPhone and iPod Touch.

From the press release:

Not only Macs are at risk from malware; now that users can install applications on the iPhone and iPod Touch, these devices are open to attack as well.

It's possible -- I mean, viruses have been shipped with retail software packages, MP3 players, and most recently a handful of digital picture frames -- but it's not a risk I'd get all choked up about. Also, because VirusBarrier scans the iPhone and iPod Touch when docked (there is no AV agent placed on the devices) users are still at risk through the most likely attack vectors: Web and mail.

Intego makes good software, and I run its firewall on my Mac Pro and MacBook Pro, but I wouldn't buy VirusBarrier X5 because it scans iPhones and the iPod Touch. The good news for current VirusBarrier X5 users is that the update is free.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2010-5110
Published: 2014-08-29
DCTStream.cc in Poppler before 0.13.3 allows remote attackers to cause a denial of service (crash) via a crafted PDF file.

CVE-2012-1503
Published: 2014-08-29
Cross-site scripting (XSS) vulnerability in Six Apart (formerly Six Apart KK) Movable Type (MT) Pro 5.13 allows remote attackers to inject arbitrary web script or HTML via the comment section.

CVE-2013-5467
Published: 2014-08-29
Monitoring Agent for UNIX Logs 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP09, and 6.2.3 through FP04 and Monitoring Server (ms) and Shared Libraries (ax) 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP08, 6.2.3 through FP01, and 6.3.0 through FP01 in IBM Tivoli Monitoring (ITM)...

CVE-2014-0600
Published: 2014-08-29
FileUploadServlet in the Administration service in Novell GroupWise 2014 before SP1 allows remote attackers to read or write to arbitrary files via the poLibMaintenanceFileSave parameter, aka ZDI-CAN-2287.

CVE-2014-0888
Published: 2014-08-29
IBM Worklight Foundation 5.x and 6.x before 6.2.0.0, as used in Worklight and Mobile Foundation, allows remote authenticated users to bypass the application-authenticity feature via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.