Feeds

Mobile subscribers showered with spam

Nuisance messages speeds up customer churn

Secure remote control for conventional and virtual desktops

Once upon a time in America

Over in the US, email to mobile attacks are dominant. Text messaging via the internet provides a cost-effective platform for miscreants to reach mobile subscribers. While numerically insignificant targets in the past, emails associated with mobile numbers are now showing up on the radar of spammers and phishers.

One in four messages sent to mobile devices via email in North America are made up of spam, according to figures from Cloudmark's mobile operator clients in the region. Mobile spam can drive up resource utilisation and customer complaints. Adding insults to injury, victims of mobile spam in the US are often charged for receiving junk SMS messages, making them more likely to complain and ask for credits from their carrier.

To date, mobile spam attacks in the US have taken the form of unsolicited advertising. However it's probably only a matter of time before scammers get in on the act, as they've already done in Europe.

Safe European home

In Europe, mobile operators' "walled garden" strategies have limited the amount of third-party content from reaching mobile users. This, combined with the relatively high cost of sending SMS messages, has limited (but not eliminated) attacks.

Low-volume, high-value attacks involving phishing and premium rate phone numbers predominate in Europe. SMS flooding — denial of service (DDos) attacks in which large volumes of SMS spam are sent during short time intervals - are also a problem in the region.

Cloudmark reckons so-called vishing attacks that combine the use of VoIP networks with conventional email phishing scams will become a growing problem for mobile subscribers this year. It warns that mobile network abuse can tarnish an operators' brand and lead to increased support costs and customer churn as some customers react to being deluged by garbage by switching networks.

Worse still, mobile abuse may undermine operator attempts to introduce revenue-producing services.

"The growth in mobile messaging abuse is exposing operators to additional and unnecessary costs at a time when they are turning to messaging and mobile advertising to open up new revenue streams," said Jamie de Guerre, chief technology officer at Cloudmark.

"For mobile operators, the greatest risk is that subscribers' zero tolerance attitude towards intrusive mobile spam will prompt them to change providers or opt out of mobile advertising and marketing opportunities, leaving much needed new revenue streams fatally crippled from the outset."

Cloudmark, a provider in the emerging mobile security space, advises mobile operators to take be proactive in protecting their subscribers rather than taking a wait and see approach to possible security problems. ®

Beginner's guide to SSL certificates

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?