Mobile phone virus is a type of computer virus that causes the application or feature phones can not be used properly. The sophistication of mobile phones close to computer technology. Mobile phones have also used the open operating system so that third-party applications can complement the sophistication of the manufacturer's standard functions. Open operating system is what ultimately becomes a gap for entry of malicious programs such as viruses, worms, and Trojan horses. Usually the virus is disguised in the form of interest such as games or images. To be more interesting again, game or image is inserted the words are vulgar.
A virus that can attack cell phones and PDAs were first discovered in 2004 around July. Experts found the software provider that is able to move and also reproduce themselves. With Bluetooth intermediaries. This virus called Cabir. After it began to appear other viruses such as Postcard-A that infiltrate the game The Mosquitos. Then came another phone virus that can send MMS automatically to the number that exist in the inbox.
The main article for this section are: worm
Worm or worm is a virus that resides on the phone memory is active and can replicate by itself. Worm spreads to another phone via email, chat, LAN, and Bluetooth.
Examples of this type of virus is the Cabir worm. Cabir spread via Bluetooth connections and get into the phone via inbox. When we click the sis file and install it, start looking for prey new Cabir mobile phone with Bluetooth access open to it infects. Another name of Cabir is SymbOS / Cabir.A , or it could be named Cabir.A, worm or virus could also be called Caribe . Cabir Bluetooth will enable a periodic basis about 15-20 minutes. There is no file corruption happening when we're exposed to this virus phone the battery will quickly run out to search for other Bluetooth devices. To prevent this we can do is turn off the Bluetooth feature on our phones and we only activate if any 'alone.
In addition to one of the Cabir worm is another type of virus that spreads via MMS Postcard and Bluetooth connections. Each of 14, the phone will reset by itself. Another name from Postcard include SymbOS / commwarrior.a . Postcard spread with an interesting way to send files to phone us. One way to prevent this is by not using Bluetooth in a very haphazard and do not receive a file of unknown origin
Trojan Horse
The main article for this section are: Trojan horse
Trojan Horse is a malicious program that pretends friendly. Trojan programs can damage the phone. Trojans can not replicate themselves like worms.
One type of Trojan is SymbOS.skulls Skulls with full name. Another name of this virus is SKULLS.A. Skulls will replace the system in the phone and cause the main menu icon changed into the image of the skull. Not only the images that changed, Skulls will also disable applications that the icon had been changed. So when we pressed the icons of the application, it will display an error message system. There are three types of Skulls A Skulls, Skulls C, and Skulls H. Mencegahvirus way is to refuse to install this application, and always close the Bluetooth connection when not needed
One of the other types of Trojan viruses are Doomboot. The virus is named complete SymbOS.Doomboot.A The workings of this virus is to create a corrupt file and after a phone infected with the virus lannya will be placed in our cell phones. Files that are corrupt were going to make the phone can not boot. The virus gets into the phone with as if it resembles the game Doom version symbian. The virus is very clever disguise, because after the phone is infected, there is no sign whatsoever that the phone had been infected with the virus. The virus is also automatically be spread via Bluetooth and lead to excessive consumption of mobile phone batteries that quickly drains the battery. . Doomboot will make the phone can not boot when we memmatikan phone and turned back.
How to Spread Virus
Mobile phone virus spreads through the following media: bluetooth, infrared, Wi-Fi, and data cable and the internet. Mobile phones increasingly prone to virus infection and this is because mobile phones have become sophisticated devices for data communication. Although use of cell phones that can send and receive files (smartphones) is still limited, but this should still look out for in the days to come. For companies that their employees use a lot of PDA phones or smartphone , then the threat of viruses to a corporate network can be increased. That requires good security in the enterprise environment.
The spread of mobile phone virus is almost beyond recognition, various ways have been done in the infected phone. Bermemori phone users must often perform the transfer of data from the phone's memory card into the computer. Users also should be careful to do it. Trend Micro, an antivirus company from the United States announced the existence of mobile phone virus capable of infecting a computer. Trend Micro revealed that the virus has appeared, called Symbos_cardtrp.A According to researchers at Trend Micro, virus was initially circulated on the Symbian Series 60 mobile platform. But this time has developed and has the potential to spread to computers that operate with Microsoft Windows systems.
As with other mobile phone virus, the virus replicates Symbos_cardtrp.A via bluetooth. Two separate mobile devices of 10 meters, can communicate wirelessly. Viruses that successfully infect the target and then settled in the memory card in mobile devices. Jump from phone to computer is an additional capability of this virus. If the user enters an infected memory card into the card slot on their computer, memory card infected with the potentially transmit the virus to your computer and will spread to other computers. If successfully executed, the virus then launched Worm_Wukill.B, who will try to spread to other computers.
Mobile phone virus called Cabir does not have the ability to damage, and works only on smart phones (smart phones) that run the Symbian operating system and equipped with a Bluetooth connection. Unlike most computer worms, Cabir does not exploit the weakness on the Symbian operating system. It exploits the way in which mobile phone should work. Cabir worm was first discovered in June 2004 after an international group of virus writers 29A to send virus samples to a number of antivirus companies.
Cabir worm was initially declared dangerous at all for the Symbian operating system. However, the worm turned out to be draining the phone battery, especially when trying to infect other Bluetooth phones that are within a radius of 30 meters.
Cabir addition, several other viruses such as Duts have infected PocketPC mobile devices. A backdoor named Brador flaw was found in a cell phone. This Trojan type virus could open access to the internet or mobile phone without the owner.
Postcard hide themselves in the form of files and sends itself via MMS - multimedia messaging service aka multimedia messages - that is usually used to send pictures, ringtones, or video clips between sophisticated phones (smartphones). Unlike other mobile phone viruses, Postcard can spread to all advanced mobile phones worldwide. Most people will be tempted to open a Postcard than Cabir - which usually ask the recipient whether going to "install Caribe?" pass the message on the screen. The reason, Postcard going undercover into the software from Symbian or offer pornographic photos are tantalizing.
Mobile phone virus is known to mysteriously not as active as expected. In addition alleged Postcard has a mysterious feature that prevents spread fast. He seemed asleep and waiting to attack.
Prevention
Anticipate needs to be done for early outbreak of the virus does not attack to the phone. Once exposed to the virus, would be fatal. It may be that the virus will delete the phone number from the list of phone numbers. Or the virus can also access the Internet automatically without realizing it so it will 'suck' the cost of rapid pulse. All the movements of the spread of the virus must be prevented, especially in the media which he uses to infect. [9]
* Turn off Bluetooth
Exchange of data, whether in the form of documents, songs, and pictures via bluetooth great potential virus attacks. This media is very helpful in exchanging data between phones. But also very dangerous if you forget to turn off the facility. To prevent the virus through the media, make sure that this facility has been shut down.
* Turn off Infrared
As with bluetooth, infrared also has great potential as a medium for the spread of mobile phone viruses. Generally, the maximum distance communication via infrared is shorter than bluetooth. And the data transferred is relatively small. So this feature must be turned off if it is not used anymore.
* Disable Wi-Fi
The exchange of documents through this medium also infected with the virus has great potential. It's still border on smart phones (smartphones) which has this facility, where it spreads through the media is not registration via bluetooth or infrared. But if the phone is functioning as a modem be a different story. As is known, the Internet is the source of all types of viruses. If the phone is connected to a computer and modem will function as a virus or trojan will quickly infiltrate into yng cell phone use. We recommend first installing antivirus software on the phone so that the spread of the virus can be detected.
* Data Cable
As with Wi-Fi, this media is most effective as a means of spreading the virus. Because the phone is directly connected to the computer when transferring data. Indeed, with the cable data transfer process will be faster and effective than other media. Be careful when installing games, themes, and ringtones. It may be that the application had been infiltrated by a virus. Generally, the virus trick the preferred prey in the form of society like the pictures arouse. Immediately turn off the connection if the computer has finished transferring data.
* Be careful connection to the Internet
Therefore, mobile phone technology nearing the computer, activities directly related to the Internet can also be done with phones such as receiving emails, chatting, downloading ring tones, music, applications, and install the application online. This is what triggered the spread of mobile viruses quickly. If the phone is not equipped with anti-virus, do not try to connect to the Internet via cell phone if you do not want infected with the virus. Although only limited to chat or receive email. Spam and viruses will infiltrate through these means.
SimWorks antivirus
Antivirus is quite effective against some viruses that attack mobile phone such as the Cabir A, Cabir B, C Cabir, the Mosquitos dialer trojan, Skulls Trojan, Trojan Locnut, and others. Application is made for mobile symbian series 60 and UIQ. Like the Nokia 6600, Sony Ericsson P900 and so forth.
Ability SimWorks other antivirusantara:
Kaspersky Antivirus Mobile
Kaspersky is a Russian antivirus company. At first, in 2004 they managed to detect and eliminate viruses on Symbian mobile phone operating system as well as windows. The virus can they overcome is the kind of Trojans and worms.
Kaspersky antivirus capabilities include:
* Removing noise when virus detected
* Automatic scanning of files that go into mobile phones
* Scanning the manual for mobile phone users
* Displays the scanning log results
* Updates via GPRS
F-Secure Mobile Antivirus
This application was made by the Finnish company. Especially for their cell phones to overcome the bias Cabir, Trojan Dialer, and Postcard. F-secure antivirus capabilities include:
* Realtime Scanning for viruses that try to enter
* Update virus database research F-Secure via HTTPS connections
* automatic virus detection to the data connection for Over The water connection
* Automatic Update application
* Documenting the type of virus found in its digital database systems F-secure t
Symantec Mobile Security for Symbian
This software maker is the market leader in its class. Well-known anti-virus is Norton. With this antivirus, mobile phones can not only protected from viruses, but also a wireless connection that can not be trusted. Every two years or so will be updated products.
Symantec's antivirus capabilities:
Development
A virus that can attack cell phones and PDAs were first discovered in 2004 around July. Experts found the software provider that is able to move and also reproduce themselves. With Bluetooth intermediaries. This virus called Cabir. After it began to appear other viruses such as Postcard-A that infiltrate the game The Mosquitos. Then came another phone virus that can send MMS automatically to the number that exist in the inbox.
The types of viruses that can damage yourWorm
The main article for this section are: worm
Worm or worm is a virus that resides on the phone memory is active and can replicate by itself. Worm spreads to another phone via email, chat, LAN, and Bluetooth.
Examples of this type of virus is the Cabir worm. Cabir spread via Bluetooth connections and get into the phone via inbox. When we click the sis file and install it, start looking for prey new Cabir mobile phone with Bluetooth access open to it infects. Another name of Cabir is SymbOS / Cabir.A , or it could be named Cabir.A, worm or virus could also be called Caribe . Cabir Bluetooth will enable a periodic basis about 15-20 minutes. There is no file corruption happening when we're exposed to this virus phone the battery will quickly run out to search for other Bluetooth devices. To prevent this we can do is turn off the Bluetooth feature on our phones and we only activate if any 'alone.
In addition to one of the Cabir worm is another type of virus that spreads via MMS Postcard and Bluetooth connections. Each of 14, the phone will reset by itself. Another name from Postcard include SymbOS / commwarrior.a . Postcard spread with an interesting way to send files to phone us. One way to prevent this is by not using Bluetooth in a very haphazard and do not receive a file of unknown origin
Trojan Horse
The main article for this section are: Trojan horse
Trojan Horse is a malicious program that pretends friendly. Trojan programs can damage the phone. Trojans can not replicate themselves like worms.
One type of Trojan is SymbOS.skulls Skulls with full name. Another name of this virus is SKULLS.A. Skulls will replace the system in the phone and cause the main menu icon changed into the image of the skull. Not only the images that changed, Skulls will also disable applications that the icon had been changed. So when we pressed the icons of the application, it will display an error message system. There are three types of Skulls A Skulls, Skulls C, and Skulls H. Mencegahvirus way is to refuse to install this application, and always close the Bluetooth connection when not needed
One of the other types of Trojan viruses are Doomboot. The virus is named complete SymbOS.Doomboot.A The workings of this virus is to create a corrupt file and after a phone infected with the virus lannya will be placed in our cell phones. Files that are corrupt were going to make the phone can not boot. The virus gets into the phone with as if it resembles the game Doom version symbian. The virus is very clever disguise, because after the phone is infected, there is no sign whatsoever that the phone had been infected with the virus. The virus is also automatically be spread via Bluetooth and lead to excessive consumption of mobile phone batteries that quickly drains the battery. . Doomboot will make the phone can not boot when we memmatikan phone and turned back.
How to Spread Virus
Mobile phone virus spreads through the following media: bluetooth, infrared, Wi-Fi, and data cable and the internet. Mobile phones increasingly prone to virus infection and this is because mobile phones have become sophisticated devices for data communication. Although use of cell phones that can send and receive files (smartphones) is still limited, but this should still look out for in the days to come. For companies that their employees use a lot of PDA phones or smartphone , then the threat of viruses to a corporate network can be increased. That requires good security in the enterprise environment.
The spread of mobile phone virus is almost beyond recognition, various ways have been done in the infected phone. Bermemori phone users must often perform the transfer of data from the phone's memory card into the computer. Users also should be careful to do it. Trend Micro, an antivirus company from the United States announced the existence of mobile phone virus capable of infecting a computer. Trend Micro revealed that the virus has appeared, called Symbos_cardtrp.A According to researchers at Trend Micro, virus was initially circulated on the Symbian Series 60 mobile platform. But this time has developed and has the potential to spread to computers that operate with Microsoft Windows systems.
As with other mobile phone virus, the virus replicates Symbos_cardtrp.A via bluetooth. Two separate mobile devices of 10 meters, can communicate wirelessly. Viruses that successfully infect the target and then settled in the memory card in mobile devices. Jump from phone to computer is an additional capability of this virus. If the user enters an infected memory card into the card slot on their computer, memory card infected with the potentially transmit the virus to your computer and will spread to other computers. If successfully executed, the virus then launched Worm_Wukill.B, who will try to spread to other computers.
Mobile phone virus called Cabir does not have the ability to damage, and works only on smart phones (smart phones) that run the Symbian operating system and equipped with a Bluetooth connection. Unlike most computer worms, Cabir does not exploit the weakness on the Symbian operating system. It exploits the way in which mobile phone should work. Cabir worm was first discovered in June 2004 after an international group of virus writers 29A to send virus samples to a number of antivirus companies.
Cabir worm was initially declared dangerous at all for the Symbian operating system. However, the worm turned out to be draining the phone battery, especially when trying to infect other Bluetooth phones that are within a radius of 30 meters.
Cabir addition, several other viruses such as Duts have infected PocketPC mobile devices. A backdoor named Brador flaw was found in a cell phone. This Trojan type virus could open access to the internet or mobile phone without the owner.
Postcard hide themselves in the form of files and sends itself via MMS - multimedia messaging service aka multimedia messages - that is usually used to send pictures, ringtones, or video clips between sophisticated phones (smartphones). Unlike other mobile phone viruses, Postcard can spread to all advanced mobile phones worldwide. Most people will be tempted to open a Postcard than Cabir - which usually ask the recipient whether going to "install Caribe?" pass the message on the screen. The reason, Postcard going undercover into the software from Symbian or offer pornographic photos are tantalizing.
Mobile phone virus is known to mysteriously not as active as expected. In addition alleged Postcard has a mysterious feature that prevents spread fast. He seemed asleep and waiting to attack.
Prevention
Anticipate needs to be done for early outbreak of the virus does not attack to the phone. Once exposed to the virus, would be fatal. It may be that the virus will delete the phone number from the list of phone numbers. Or the virus can also access the Internet automatically without realizing it so it will 'suck' the cost of rapid pulse. All the movements of the spread of the virus must be prevented, especially in the media which he uses to infect. [9]
* Turn off Bluetooth
Exchange of data, whether in the form of documents, songs, and pictures via bluetooth great potential virus attacks. This media is very helpful in exchanging data between phones. But also very dangerous if you forget to turn off the facility. To prevent the virus through the media, make sure that this facility has been shut down.
* Turn off Infrared
As with bluetooth, infrared also has great potential as a medium for the spread of mobile phone viruses. Generally, the maximum distance communication via infrared is shorter than bluetooth. And the data transferred is relatively small. So this feature must be turned off if it is not used anymore.
* Disable Wi-Fi
The exchange of documents through this medium also infected with the virus has great potential. It's still border on smart phones (smartphones) which has this facility, where it spreads through the media is not registration via bluetooth or infrared. But if the phone is functioning as a modem be a different story. As is known, the Internet is the source of all types of viruses. If the phone is connected to a computer and modem will function as a virus or trojan will quickly infiltrate into yng cell phone use. We recommend first installing antivirus software on the phone so that the spread of the virus can be detected.
* Data Cable
As with Wi-Fi, this media is most effective as a means of spreading the virus. Because the phone is directly connected to the computer when transferring data. Indeed, with the cable data transfer process will be faster and effective than other media. Be careful when installing games, themes, and ringtones. It may be that the application had been infiltrated by a virus. Generally, the virus trick the preferred prey in the form of society like the pictures arouse. Immediately turn off the connection if the computer has finished transferring data.
* Be careful connection to the Internet
Therefore, mobile phone technology nearing the computer, activities directly related to the Internet can also be done with phones such as receiving emails, chatting, downloading ring tones, music, applications, and install the application online. This is what triggered the spread of mobile viruses quickly. If the phone is not equipped with anti-virus, do not try to connect to the Internet via cell phone if you do not want infected with the virus. Although only limited to chat or receive email. Spam and viruses will infiltrate through these means.
SimWorks antivirus
Antivirus is quite effective against some viruses that attack mobile phone such as the Cabir A, Cabir B, C Cabir, the Mosquitos dialer trojan, Skulls Trojan, Trojan Locnut, and others. Application is made for mobile symbian series 60 and UIQ. Like the Nokia 6600, Sony Ericsson P900 and so forth.
Ability SimWorks other antivirusantara:
- Scans files and messages in realtime when entered into the phone to prevent further infection
- Can be used manually if we are less confident with the files in our mobile phone
- Perform scanning automatically in certain time intervals in accordance with our wishes.
- On automatically when the phone is turned on. Displays the scanning log results
- Integrated with the server to be able to perform virus definition updates when a new type of virus found that can overcome
Kaspersky Antivirus Mobile
Kaspersky is a Russian antivirus company. At first, in 2004 they managed to detect and eliminate viruses on Symbian mobile phone operating system as well as windows. The virus can they overcome is the kind of Trojans and worms.
Kaspersky antivirus capabilities include:
* Removing noise when virus detected
* Automatic scanning of files that go into mobile phones
* Scanning the manual for mobile phone users
* Displays the scanning log results
* Updates via GPRS
F-Secure Mobile Antivirus
This application was made by the Finnish company. Especially for their cell phones to overcome the bias Cabir, Trojan Dialer, and Postcard. F-secure antivirus capabilities include:
* Realtime Scanning for viruses that try to enter
* Update virus database research F-Secure via HTTPS connections
* automatic virus detection to the data connection for Over The water connection
* Automatic Update application
* Documenting the type of virus found in its digital database systems F-secure t
Symantec Mobile Security for Symbian
This software maker is the market leader in its class. Well-known anti-virus is Norton. With this antivirus, mobile phones can not only protected from viruses, but also a wireless connection that can not be trusted. Every two years or so will be updated products.
Symantec's antivirus capabilities:
- Detects and automatically removes viruses and other malware code
- Has built-in firewall monitors the communication LAN / WAN and block suspected file
- Protects since it was first installed, it automatically switch on antivirus protection and block ports that can be penetrated by the virus.
- Easy to use real time protection against SMS, EMS, MMS that has malicious code.
- Scanning the manual as the user desires
- Inform the user with a virus alert system will rise, latest updates and when the service is almost expired.