preview

Using Malware On Personal Devices

Decent Essays

show a rise of mobile apps that exploit the trust people have in brands and major companies (Miners, 2014).
Even Apple fans are not immune to malware slipping past the cracks and making its way onto the Apple App Store. In 2012, a Russian language app, “Find and Call” was available on the App Store for download (Bonnington, 2012). Essentially, the app is a Trojan that steals the user’s contact list and GPS coordinates then uploads the information to a remote server. Once the information is on the remote server, it sends spam to the victim’s contacts telling them about the Find and Call app (Bonnington, 2012). Although the App Store has been malware free for five years, this app did pass through Apple’s screening process and make its way onto the App Store (Bonnington, 2012).
Malware on personal devices in a BYOD setting can be dangerous to the organization. Employees who accidently download malicious apps to their personal devices can potentially give hackers unauthorized access to corporate data. Coupled with other threats like jail-broken phones, preinstalled malware prior to shipping and mobile vulnerabilities can be a major nightmare to the IT department implementing BYOD (“Implementing BYOD,” 2012).
Another way that corporate data is compromised is through disgruntled or fired employees. Most employees may retain some data after they leave the organization and will notify the IT department to properly discard the data. However, fired or disgruntled employees usually

Get Access