Feeds

Sophos changes tack with mobile anti-virus launch

U-turn

Top 5 reasons to deploy VMware with Tegile

Sophos, the UK anti-virus developer, launched an anti-virus product for Windows mobiles yesterday. After years of saying the threat of viruses infecting mobile devices is over-hyped, Sophos now maintains the protection against a "growing number of malware attacks" aimed at Windows Mobile is necessary.

In a recent Sophos web poll, 81 per cent of business IT administrators "expressed concern" that malware and spyware targeting mobile devices "will become a significant threat in the future", while 64 per cent of respondents have not deployed security protection for their Windows smartphones and PDAs.

The survey's findings will be music to the ears of Sophos's marketing department ahead of the launch of Sophos Mobile Security. This is designed to provide real-time protection for Windows Mobile 5.0-based devices (PDAs and smartphones) against mobile viruses and spyware threats. Sophos's competitors, such as McAfee and F-Secure - have had mobile security products for some years. Sophos says its product differs from others in the market in having a minimal effect on device performance.

Graham Cluley, Sophos senior technology consultant, said the number of malware packages affecting mobile phones is tiny compared to those affecting Windows desktops. At most, there are 200 strains of mobile malware, most of which affect Symbian devices.

Even though the threat is minimal, Sophos's customers are looking for mobile malware protection, particularly to defend PDAs and smart-phones running Windows Mobile. In response, the company has produced Windows mobile security software ahead of developing protection for Symbian devices.

Cluley said he will continue to debunk alarmist stories about the mobile malware threat, but notes organisations investing in mobile malware protection were taking a precautionary approach.

"There's been no big outbreaks of mobile viruses against any platform but there is the possibility of targeted attack against mobile devices of particular organisation akin to the Trojan attacks against PCs we've seen more of over the last year or so," he told El Reg.

"Mobile malware isn't much of a threat at present, but firms need to think two to five years ahead when making purchasing decisions. ®

Internet Security Threat Report 2014

More from The Register

next story
'Kim Kardashian snaps naked selfies with a BLACKBERRY'. *Twitterati gasps*
More alleged private, nude celeb pics appear online
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Freenode IRC users told to change passwords after securo-breach
Miscreants probably got in, you guys know the drill by now
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
BitTorrent's peer-to-peer chat app Bleep goes live as public alpha
A good day for privacy as invisble.im also reveals its approach to untraceable chats
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.