Feeds

Smartphones get a firewall

More useful phones are more dangerous phones, says Trend Micro

Choosing a cloud hosting partner with confidence

Trend Micro has a new version of its mobile security software out. Imaginatively named Trend Micro Mobile Security 3.0, it adds a firewall and intrusion detection software - the previous version was antivirus and antispam only.

V3 will only run on the latest Windows Mobile 5 and Symbian 9.1 systems though, the rationale being that as the market grows so fast, they will be the bulk of malware-targeted systems very soon.

"IDC estimates that over 100 million smartphones will ship this year," says Trend's device security director Todd Thiemann, "and viruses need the ability to run processes in the background, so even Java-capable basic phones aren't a big threat."

Thiemann says that smartphones are attracting more and more software developers, both good and bad. Nokia, for instance, has 2 million registered developers, while Windows Mobile has 650,000. "The malware community is cutting its teeth and learning how to create for these devices," he adds.

Mobile Security 3's firewall and IDS are particularly relevant when a smartphone also runs business apps over Wi-Fi, Trend says. Indeed, the company claims that the convergence of business and personal use on a single device is what makes it such an attractive target for malware, along with the multiplicity of routes that a virus can use to get onto the device, including wireless data, PC sync, memory cards and peer-to-peer Bluetooth links.

New categories of threat are emerging too, oriented on the specific properties of phones and moving away from vandalism towards financial gain, says Thiemann. Examples include malware that sends premium SMS, or remotely activates the handset's microphone to spy on the user.

The Windows release is out now and the Symbian one will follow early in 2007. The software costs $35 (£20), which includes a year's updates and service.

Will smartphone users shell out that much for protection against a threat many can't see yet? Perhaps not - but Thiemann points to the cost of cleaning up a virus outbreak or corporate information leak, implying that Trend's real targets are enterprises, network operators and even bundled software for phone manufacturers. ®

Website security in corporate America

More from The Register

next story
Bono: Apple will sort out monetising music where the labels failed
Remastered so hard it would be difficult or impossible to master it again
Oi, Tim Cook. Apple Watch. I DARE you to tell me, IN PERSON, that it's secure
State attorney demands Apple CEO bows the knee to him
4K-ing excellent TV is on its way ... in its own sweet time, natch
For decades Hollywood actually binned its 4K files. Doh!
Your chance to WIN the WORLD'S ONLY HANDHELD ZX SPECTRUM
Reg staff not allowed to enter, god dammit
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Monitors monitor's monitoring finds touch screens have 0.4% market share
Not four. Point four. Count yer booty again, Microsoft
Getting to the BOTTOM of the great office seating debate
Belay that toil, me hearty, and park your scurvy backside
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.