Feeds

We've got the solution. Where's the problem?

Anti-virus software for handhelds

  • alert
  • submit to reddit

Providing a secure and efficient Helpdesk

Firms selling antivirus software for mobile platforms are "selling insurance for something that doesn't exist" - an antivirus software firm claims.

And worse, the development of antivirus software for PDAs and other handheld devices could give virus writers ideas for malicious code that they might not otherwise have thought of.

That's the contentious view of Bruce Walton, UK managing director of antivirus firm Command. He notes that no virus poses a risk to PDAs and claims that the development of security software for handhelds could "pre-warn virus authors or show them a way to do malicious code".

Walton argues that rival antivirus developers are jumping the gun in developing a cure for handheld viruses before there's any sign of a disease.

"How can you develop antivirus software without knowing what a virus author might do? You're just guessing what he might do," he said.

Malice in Wonderland

Jack Clark, of Network Associates, a rival security firm gives short shrift to Walton's thesis that antivirus software developers, who know a great deal about how malicious code works, can think of nasty exploits that wouldn't occur to clueless virus authors.

He argues that antivirus software for handhelds responds proactively to the problem and "closes the door on the threat before it occurs".

Although how much of a problem bugs on PDA will be remains unknown, he admitted, that didn't stop Clark comparing Command's approach to "leaving the doors open until someone steals your TV".

Clark dismissed the idea that developing antivirus software for handhelds software might give virus authors any help, "we don't leave clues in our software on how to develop viruses," he said.

Walton agrees that viruses and worms will arrive, one day, on handhelds, simply because these devices are so popular that virus writers will have easy access to the technology. Furthermore, they will strive to create malicious code in the knowledge that, if successful, their creations could wreak widespread havoc. ®

Related stories

Palm Pilot virus isolated
Stop the antivirus vendor hype
Anna Kournikova bug drops harmlessly onto the Net
Users haven't learned any lessons from the Love Bug
Virus toolkits are s'kiddie menace
Which country has the most virus infected PCs?

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.