A bug found in the chips of iPhone, Samsung Galaxy and Google Nexus devices could be utilised to develop malware that jumps from one device to another.
This is according to security expert Nitay Artenstein, who initially discovered the issue and has warned users to update their operating systems as soon as possible to protect their handset from attacks.
Labelled Broadpwn, the security flaw affects phones by capitalising on a variety of specific flaws in Wi-Fi chips manufactured by Broadcom. This allows hackers to write programs directly on the chip and control it.
“When I started working in this field, we had worms, self-propagating malware which could be run across the network. There were quite a few in the good old days. They died out, together with remote exploits: worms pretty much need them to propagate.
“But Broadpwn is a perfect bug for this kind of thing. A pretty good location to make the first Wi-Fi worm and the first network worm in a few years,” Mr Atenstein explained.
Malware can spread quickly through devices via Wi-Fi networks, making it vital for businesses to properly educate their staff on cyber threats.
How can companies prepare for these viruses?
In order for businesses to protect themselves against cyber attacks, it is key that all staff are properly engaged with in-house security protocol. If the right attitude is not adopted, companies could find themselves vulnerable to a host of threats.
With Bring Your Own Device (BYOD) trends continuing to rise in popularity, it is easy for employee-owned hardware to leave security networks susceptible as many people are not aware of how viruses can transfer between smartphones and tablets.
To make sure your company is not leaving itself at risk, it is important that all tools being used on networks are properly scanned for viruses and other threats. Employee should also be made aware of any common viruses in circulation and advised on how to avoid them.
By putting a strict BYOD policy in place, staff will be educated in cyber crime and understand exactly what to look out for.
To do this, a number of key rules must be set. These could include not allowing any apps not verified by Apple and Google’s own stores,which will help to ensure that malware does not enter the network.
All devices should also have strong password-protection in order to reduce the threat of cyber attacks, and any tablets or smartphones no longer supported by their operating system should not be allowed.
Share This Post, Choose Your Platform!
With over 20 years in the business telecoms industry and an unrivalled reputation of delivering excellent, personal customer service, Arrow is one of very few companies in the UK able to provide a full telecoms, IT and energy consultancy and service proposition.
Savings through automation, scale, improved service. We’ve got that covered. But the true value comes with empathy, through empowerment, collaboration. It’s connecting people that drives us forward. It’s people that make tomorrow happen.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.