Cloudmark Goes After SMS Exploits - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Mobile
News
6/23/2009
06:17 PM
50%
50%

Cloudmark Goes After SMS Exploits

The carrier-grade mobile messaging security system provides content filtering, reputation data, and monitoring of text and multimedia messages.

Text messaging is expected to continue to grow at a rapid pace and be a big moneymaker for carriers, but there's growing concern that criminals could use SMS for malicious purposes.

With this in mind, Cloudmark has introduced a mobile messaging security system aimed at mobile operators. The product, known as MobileAuthority, offers carriers expert security recommendations, and it enables them to detect malicious text and multimedia messages, as well as identify senders.

"The continued rapid growth of mobile messaging has created an environment that is ripe for abuse by attackers, and the situation will undoubtedly worsen for both operators and their customers if steps are not taken to address messaging security," said Michael Osterman, founder of Osterman Research, in a statement. "There is a growing need for solutions that will not only protect customers from messaging threats, but also relieve the cost and infrastructure burden that mobile spam volume is placing on operator networks."

Mobile phones haven't been attacked to the same degree that desktop computers have, but many security experts believe it's only a matter of time because more people are carrying important information on these devices. Criminals may not be able to reach these devices through the Internet, but nearly all of them can be reached by SMS.

Symbian has recently faced malicious coders trying to take advantage of some SMS vulnerabilities. The "Curse of Silence" exploit enabled remote attackers to disable a handset's messaging capabilities with a single malformed SMS. Another exploit used an SMS to spread a Trojan that steals money from wireless subscribers. Symbian has fixed both exploits.

Cloudmark said it's utilizing its history of online messaging security to tackle the mobile security issue. The company said it has received a lot of interest from text-heavy operators in the Asian markets, as well as proactive carriers that see SMS security as a differentiator.


Most companies are just starting the hard work of mobilizing workforces by bringing the software they use to mobile device. InformationWeek analyzed this issue and determined the best practices, and the report can be downloaded here (registration required).

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Slideshows
What Digital Transformation Is (And Isn't)
Cynthia Harvey, Freelance Journalist, InformationWeek,  12/4/2019
Commentary
Watch Out for New Barriers to Faster Software Development
Lisa Morgan, Freelance Writer,  12/3/2019
Commentary
If DevOps Is So Awesome, Why Is Your Initiative Failing?
Guest Commentary, Guest Commentary,  12/2/2019
White Papers
Register for InformationWeek Newsletters
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Video
Current Issue
Getting Started With Emerging Technologies
Looking to help your enterprise IT team ease the stress of putting new/emerging technologies such as AI, machine learning and IoT to work for their organizations? There are a few ways to get off on the right foot. In this report we share some expert advice on how to approach some of these seemingly daunting tech challenges.
Slideshows
Flash Poll