Newsletter Content

Mobile Botnets Make the Internet Even Less Secure

b2ap3_thumbnail_hackers_are_using_botnets_400.jpgTechnology is often exploited by hackers for their benefit, but one avenue of attack that’s consistently neglected is the mobile device. Smartphones and tablets are arguably at greater risk than desktops and workstations due to them being exposed to more wireless networks. One of the greatest threats to these devices is the botnet, a threat that usually targets desktop computers, enslaving them and turning the machine against its owner (and the rest of the Internet).

What’s a Botnet?
A botnet isn’t just a single threat; it’s a collective term used to describe several computers or devices that have been turned into bots, which are at the mercy of hackers. Essentially, as described by CyberTrend, botnets are:

[...] a series of computers, or smartphones and tablets in the case of mobile bots, that have been infected with a self-replicating backdoor Trojan that lets cybercriminals force the network to perform unauthorized commands, en masse. Once infected with such malware, a computer or mobile device becomes a single node in the botnet, referred to as a zombie or bot. The strength of the botnet is in the numbers. Cybercriminals use a system known as a command-and-control computer to issue commands and distribute the malware.

In other words, a botnet emulates a zombie horde, absorbing more devices into its control and forcing them to bend to the will of a hacker. These devices can then be used for any number of purposes, such as spreading malware and viruses across a vast network of users, generating spam, collecting information, and so on. One of the worst things botnets can do is initiate a DDoS attack, which overloads a server with traffic, rendering it useless until the attack ceases. This causes excessive downtime, which can lead to wasted time and expenses.

But Why Mobile Devices?
As previously mentioned, the same security solutions that work for many desktop and workstation platforms don’t necessarily work the same way for mobile devices; or, rather, people tend to not consider mobile devices as a threat medium. This makes mobile devices a prime target for being turned into botnets. The fact that so many people are partaking in BYOD (Bring Your Own Device), where employees bring their own devices to the office for work purposes, is also fostering the idea that mobile devices can be used to spread malware and viruses.

What You Can Do
The best way to avoid becoming part of a botnet, for both a mobile device and a workstation PC, is to integrate comprehensive security protocol on all of your devices. By taking a proactive stance against this threat, you can avoid getting infected and becoming a tool to spread the infection to others. For mobile devices, be sure to take advantage of some sort of security solution, and to keep it updated at all times. The same goes for any applications you use on your devices. Ensure that you are using the most recent versions of your apps, which will minimize the security holes in your system’s defenses.

Of course, while mobile botnets are increasing in number, their PC counterparts are far more prevalent. Therefore, you need to ensure that your business’s workstations are also secured from the threat of botnets. A Unified Threat Management solution can provide the means to keep malware and viruses out of your system, eradicate those that do get in, put a halt to spam, and block malicious or time-wasting web content. To learn more, give us a call at 603-889-0800.

Related Articles

  • 4 Internal Threats Every Business Owner Should Understand In light of all the data leaks and vulnerabilities that have been brought to light over the past few years, network security has to be a priority for every business. One problem many organizations have is that while they are protecting their network and infrastructure from threats outside their comp...
  • Would You Fall for this Adult Scam if You Saw an Old Passwor... As you may expect, the average Internet scammer isn’t above resorting to dirty tricks to claim their ill-gotten prize from their victims. A recent scam demonstrates just how dirty these tricks can truly be, and unfortunately, how ill-prepared many are to handle them. To preface this scam, we need...
  • Getting to Know Technology: Hackers It doesn’t matter how much of a technology novice someone is, chances are, they’ve heard the term “hacker” before. A favorite character trope of Hollywood films and television dramas, these cybercriminals have appeared in productions like Die Hard and Mr. Robot with varying degrees of accuracy. Belo...
  • Is It Safe to Have Your Browser Remember Your Passwords? Let’s be honest - not all of us have the best memories. This makes the ability for many browsers to remember our passwords seem like a godsend. However, is this capability actually a good thing for your cybersecurity? The answer may not surprise you. Nope! While yes, the fact that we no longer ha...
  • Tip of the Week: How to Spot a Scam What would you do if you sat down at your desk one morning, coffee still kicking in, to discover a pop-up message on your computer announcing that Microsoft has detected a fatal issue with your workstation, and if they aren’t allowed to remote in and fix it, the entire network could be at risk? Woul...
  • Tip of the Week: Awareness Is Important When Surfing the Web We all love the Internet. We all use it almost every day. For this week’s tip, we’ll review a few ways to help keep yourself from getting in trouble while browsing. Sacrificing Security for ConvenienceFor starters, most of the threats to be found online are of the sort that can be avoided somewha...
With the surge in the number of small and medium businesses that have fallen prey to malware and cyber criminals, there is a lot of focus of what an organization can do to prevent being a victim and how the company should handle themselves after an attack. There is another key factor to preventing cyber criminals from penetrating into your network:...

- Onsite Service Coverage Area -

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH and then down into Boston. From Northern and Central Mass we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

 

603-889-0800

White Mountain IT Services
33 Main Street Suite 302
Nashua, New Hampshire 03064

 

 padlock1  Cyber Security Toolkit

cloud desktop2 Cloud Desktop Login

Open Positions