Owners of smartphones and other mobile devices should scrutinise their gadgets for viruses next year, as they come under increased attack from cyber criminals, experts warn.
Are you the strongest link?
Business Quiz 2011 Do you have your finger on the pulse of business? Take our online contest for your chance to win brunch for two. Take the quiz
"In the Middle East, especially, the mobile usage is pretty high and people have more than one most of the time," said Bulent Teksoz, the chief security strategist for emerging markets at Symantec, the online security firm.
"But the level of security on smartphones is nowhere near an acceptable level. We'll see [attacks] increase more and more next year."
While a survey conducted by Symantec has found that more than half of UAE residents run antivirus software on their desktop and laptop computers, very few think about protecting their smartphones. And many who own one use the device to check their emails frequently.
One in nearly every 328 emails in November was identified as malicious, which was up from about one in every 433 emails in October, according to data from Symantec.
The growing popularity of mobile-based software applications - or apps, as they are commonly called - is another major reason phones are expected to be targeted more often next year.
Apple announced this month that its online store now featured more than 500,000 apps, which customers are downloading at a rate of more than 1 billion a month.
Yet mobile phones that run Google's Android operating system, in particular, "will suffer from more cyber criminal attacks", warns Trend Micro, a cyber security firm that recently released a report outlining predictions for attacks in the new year.
A new threat, which Symantec dubs "Android.Arspam", emerged during the Arab Spring on the Android Market this year when it was embedded into a pirated, popular Islamic app, then distributed through online forums that focused on Middle Eastern issues. The official version of the app is not affected but looks remarkably similar.
"The Arab Spring is just one of many trending topics that are attracting a higher volume of online traffic which is essentially where the low-hanging fruits lie," Mr Teksoz said.
More than 10 billion apps have been downloaded from the Android Market so far, Google announced earlier this month.
Experts say the Android platform has become a favourite target among hackers because of its app distribution model, which makes it completely open to all outside parties and prone to more attacks. "We believe this will continue in 2012 although other platforms will also come under fire," Trend Micro warns.
Criminals are expected to release more malicious apps next year, and go after legitimate ones as well, by finding vulnerabilities or coding errors that could help them obtain personal data or unleash viruses upon victims.
"Compounding this further is the fact that very few app developers have a mature vulnerability handling and remediation process, which means the window of exposure for these flaws may be longer," according to Trend Micro's report.
Other mobile devices such as tablets are also of "major concern", said Mr Teksoz. He said slate computers, which include Apple's iPad and Samsung's Galaxy Tab, fly under the radar of IT experts in the workplace and often hold sensitive corporate data.
Some employees then steal highly confidential intellectual property using these devices.
Others have become victims of cyber attacks on these mobile devices, after rival companies used digital espionage to acquire proprietary information. In the past, these kinds of attacks tended to occur on desktops or laptop computers.
"Will we see more digital espionage spilling over to tablet devices and mobile phones? Yes," Mr Teksoz said. "As long as they contain confidential information, which we know they do, and are not as protected they are the weakest link in the whole security cycle."
nparmar@thenational.ae
twitter: Follow our breaking business news and retweet to your followers. Follow us
MOUNTAINHEAD REVIEW
Starring: Ramy Youssef, Steve Carell, Jason Schwartzman
Director: Jesse Armstrong
Rating: 3.5/5
Dust and sand storms compared
Sand storm
- Particle size: Larger, heavier sand grains
- Visibility: Often dramatic with thick "walls" of sand
- Duration: Short-lived, typically localised
- Travel distance: Limited
- Source: Open desert areas with strong winds
Dust storm
- Particle size: Much finer, lightweight particles
- Visibility: Hazy skies but less intense
- Duration: Can linger for days
- Travel distance: Long-range, up to thousands of kilometres
- Source: Can be carried from distant regions
Bio
Age: 25
Town: Al Diqdaqah – Ras Al Khaimah
Education: Bachelors degree in mechanical engineering
Favourite colour: White
Favourite place in the UAE: Downtown Dubai
Favourite book: A Life in Administration by Ghazi Al Gosaibi.
First owned baking book: How to Be a Domestic Goddess by Nigella Lawson.
Honeymoonish
%3Cp%3E%3Cstrong%3EDirector%3A%3C%2Fstrong%3E%20Elie%20El%20Samaan%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EStarring%3A%20%3C%2Fstrong%3ENour%20Al%20Ghandour%2C%20Mahmoud%20Boushahri%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3ERating%3A%3C%2Fstrong%3E%203%2F5%3C%2Fp%3E%0A
SPEC%20SHEET%3A%20APPLE%20M3%20MACBOOK%20AIR%20(13%22)
%3Cp%3E%3Cstrong%3EProcessor%3A%3C%2Fstrong%3E%20Apple%20M3%2C%208-core%20CPU%2C%20up%20to%2010-core%20CPU%2C%2016-core%20Neural%20Engine%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EDisplay%3A%3C%2Fstrong%3E%2013.6-inch%20Liquid%20Retina%2C%202560%20x%201664%2C%20224ppi%2C%20500%20nits%2C%20True%20Tone%2C%20wide%20colour%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EMemory%3A%3C%2Fstrong%3E%208%2F16%2F24GB%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EStorage%3A%3C%2Fstrong%3E%20256%2F512GB%20%2F%201%2F2TB%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EI%2FO%3A%3C%2Fstrong%3E%20Thunderbolt%203%2FUSB-4%20(2)%2C%203.5mm%20audio%2C%20Touch%20ID%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EConnectivity%3A%3C%2Fstrong%3E%20Wi-Fi%206E%2C%20Bluetooth%205.3%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EBattery%3A%3C%2Fstrong%3E%2052.6Wh%20lithium-polymer%2C%20up%20to%2018%20hours%2C%20MagSafe%20charging%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3ECamera%3A%3C%2Fstrong%3E%201080p%20FaceTime%20HD%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EVideo%3A%3C%2Fstrong%3E%20Support%20for%20Apple%20ProRes%2C%20HDR%20with%20Dolby%20Vision%2C%20HDR10%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EAudio%3A%3C%2Fstrong%3E%204-speaker%20system%2C%20wide%20stereo%2C%20support%20for%20Dolby%20Atmos%2C%20Spatial%20Audio%20and%20dynamic%20head%20tracking%20(with%20AirPods)%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EColours%3A%3C%2Fstrong%3E%20Midnight%2C%20silver%2C%20space%20grey%2C%20starlight%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EIn%20the%20box%3A%3C%2Fstrong%3E%20MacBook%20Air%2C%2030W%2F35W%20dual-port%2F70w%20power%20adapter%2C%20USB-C-to-MagSafe%20cable%2C%202%20Apple%20stickers%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EPrice%3A%3C%2Fstrong%3E%20From%20Dh4%2C599%3C%2Fp%3E%0A
Common OCD symptoms and how they manifest
Checking: the obsession or thoughts focus on some harm coming from things not being as they should, which usually centre around the theme of safety. For example, the obsession is “the building will burn down”, therefore the compulsion is checking that the oven is switched off.
Contamination: the obsession is focused on the presence of germs, dirt or harmful bacteria and how this will impact the person and/or their loved ones. For example, the obsession is “the floor is dirty; me and my family will get sick and die”, the compulsion is repetitive cleaning.
Orderliness: the obsession is a fear of sitting with uncomfortable feelings, or to prevent harm coming to oneself or others. Objectively there appears to be no logical link between the obsession and compulsion. For example,” I won’t feel right if the jars aren’t lined up” or “harm will come to my family if I don’t line up all the jars”, so the compulsion is therefore lining up the jars.
Intrusive thoughts: the intrusive thought is usually highly distressing and repetitive. Common examples may include thoughts of perpetrating violence towards others, harming others, or questions over one’s character or deeds, usually in conflict with the person’s true values. An example would be: “I think I might hurt my family”, which in turn leads to the compulsion of avoiding social gatherings.
Hoarding: the intrusive thought is the overvaluing of objects or possessions, while the compulsion is stashing or hoarding these items and refusing to let them go. For example, “this newspaper may come in useful one day”, therefore, the compulsion is hoarding newspapers instead of discarding them the next day.
Source: Dr Robert Chandler, clinical psychologist at Lighthouse Arabia
U19 WORLD CUP, WEST INDIES
UAE group fixtures (all in St Kitts)
- Saturday 15 January: UAE beat Canada by 49 runs
- Thursday 20 January: v England
- Saturday 22 January: v Bangladesh
UAE squad:
Alishan Sharafu (captain), Shival Bawa, Jash Giyanani, Sailles
Jaishankar, Nilansh Keswani, Aayan Khan, Punya Mehra, Ali Naseer, Ronak Panoly,
Dhruv Parashar, Vinayak Raghavan, Soorya Sathish, Aryansh Sharma, Adithya
Shetty, Kai Smith
The biog
Hometown: Birchgrove, Sydney Australia
Age: 59
Favourite TV series: Outlander Netflix series
Favourite place in the UAE: Sheikh Zayed Grand Mosque / desert / Louvre Abu Dhabi
Favourite book: Father of our Nation: Collected Quotes of Sheikh Zayed bin Sultan Al Nahyan
Thing you will miss most about the UAE: My friends and family, Formula 1, having Friday's off, desert adventures, and Arabic culture and people
COMPANY PROFILE
Name: Kumulus Water
Started: 2021
Founders: Iheb Triki and Mohamed Ali Abid
Based: Tunisia
Sector: Water technology
Number of staff: 22
Investment raised: $4 million
WOMAN AND CHILD
Director: Saeed Roustaee
Starring: Parinaz Izadyar, Payman Maadi
Rating: 4/5
Sri Lanka's T20I squad
Thisara Perera (captain), Dilshan Munaweera, Danushka Gunathilaka, Sadeera Samarawickrama, Ashan Priyanjan, Mahela Udawatte, Dasun Shanaka, Sachith Pathirana, Vikum Sanjaya, Lahiru Gamage, Seekkuge Prasanna, Vishwa Fernando, Isuru Udana, Jeffrey Vandersay and Chathuranga de Silva.
What is blockchain?
Blockchain is a form of distributed ledger technology, a digital system in which data is recorded across multiple places at the same time. Unlike traditional databases, DLTs have no central administrator or centralised data storage. They are transparent because the data is visible and, because they are automatically replicated and impossible to be tampered with, they are secure.
The main difference between blockchain and other forms of DLT is the way data is stored as ‘blocks’ – new transactions are added to the existing ‘chain’ of past transactions, hence the name ‘blockchain’. It is impossible to delete or modify information on the chain due to the replication of blocks across various locations.
Blockchain is mostly associated with cryptocurrency Bitcoin. Due to the inability to tamper with transactions, advocates say this makes the currency more secure and safer than traditional systems. It is maintained by a network of people referred to as ‘miners’, who receive rewards for solving complex mathematical equations that enable transactions to go through.
However, one of the major problems that has come to light has been the presence of illicit material buried in the Bitcoin blockchain, linking it to the dark web.
Other blockchain platforms can offer things like smart contracts, which are automatically implemented when specific conditions from all interested parties are reached, cutting the time involved and the risk of mistakes. Another use could be storing medical records, as patients can be confident their information cannot be changed. The technology can also be used in supply chains, voting and has the potential to used for storing property records.