Feeds

Sophos changes tack with mobile anti-virus launch

U-turn

Using blade systems to cut costs and sharpen efficiencies

Sophos, the UK anti-virus developer, launched an anti-virus product for Windows mobiles yesterday. After years of saying the threat of viruses infecting mobile devices is over-hyped, Sophos now maintains the protection against a "growing number of malware attacks" aimed at Windows Mobile is necessary.

In a recent Sophos web poll, 81 per cent of business IT administrators "expressed concern" that malware and spyware targeting mobile devices "will become a significant threat in the future", while 64 per cent of respondents have not deployed security protection for their Windows smartphones and PDAs.

The survey's findings will be music to the ears of Sophos's marketing department ahead of the launch of Sophos Mobile Security. This is designed to provide real-time protection for Windows Mobile 5.0-based devices (PDAs and smartphones) against mobile viruses and spyware threats. Sophos's competitors, such as McAfee and F-Secure - have had mobile security products for some years. Sophos says its product differs from others in the market in having a minimal effect on device performance.

Graham Cluley, Sophos senior technology consultant, said the number of malware packages affecting mobile phones is tiny compared to those affecting Windows desktops. At most, there are 200 strains of mobile malware, most of which affect Symbian devices.

Even though the threat is minimal, Sophos's customers are looking for mobile malware protection, particularly to defend PDAs and smart-phones running Windows Mobile. In response, the company has produced Windows mobile security software ahead of developing protection for Symbian devices.

Cluley said he will continue to debunk alarmist stories about the mobile malware threat, but notes organisations investing in mobile malware protection were taking a precautionary approach.

"There's been no big outbreaks of mobile viruses against any platform but there is the possibility of targeted attack against mobile devices of particular organisation akin to the Trojan attacks against PCs we've seen more of over the last year or so," he told El Reg.

"Mobile malware isn't much of a threat at present, but firms need to think two to five years ahead when making purchasing decisions. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.