See Full Story
Yet another Android malware package has been publicized just two weeks after the last one, dubbed "DroidDream Light," was disclosed. This latest malware, named "Plankton" by Xuxian Jiang, an assistant professor in North Carolina State University's computer science department, exploits Dalvik, Android's process virtual machine, Jiang wrote. That allowed it remain undetected by traditional antivirus software packages for mobile OSes for more than two months, he stated.
Yet another malware beast, or should I say Sea Monster, has raised it's ugly head! Thanks Richard for your insightful comments. Just one more reason that mobile content providers need to become more diligent when securing their networks. In order to defend against this type of infestation, providers (even Android) can no longer rely on point solutions such as firewalls, IDS/IPS device, or simple IP reputations. Solutions that can provide deep content inspection to detect embedded attacks across the apps marketplace should be implemented to combat these threats. Our company, Wedge Networks has focused on building solutions for years and is leading efforts to prevent bad things from flowing out...or in.
Why is it that Google can't stop this? I realize that they allow Apps to be posted without screening. But there is a main submission site. Why can't these Apps be screened for malware? Smart phones are just sitting ducks for this malware. I think this is the main problem with open source, open marketplace Apps. The advantage to Apple's App store is oversight. In these time's where Malware and hackers seem to have nothing better to do with their skills. We need more oversight from Google to protect their systems. Its obvious from the Sony problems that not enough is being done.