In a previous post, we discussed what malware can do once it is active on your phone. But how do end-users get malware in the first place? In this post we explain the sources of malware, and how to avoid it.
There are a few broad categories for how users get malware:
If your phone happens to be “rooted” or “jailbroken”, it is not by default un-secured. This is because the same process which lets you root your phone is also the one that allows it to update faster than what the manufacturer intends.
However, at the same time, it also provides a mechanism for malware to gain rights without having to exploit operating system vulnerabilities. As you probably could have guessed, this makes it slightly harder to detect any malware.
So, what can you as an end-user do to avoid malware? Here is a list of quick tips:
When you’re installing new apps, be wary of those that require permissions such as “receive SMS”, or those that install new accessibility services. These can be used to receive OTP pins sent by SMS and remote control the user interface of apps.
Unlock updates, insights, and exclusive content delivered to you.
There are some software solutions, such as antivirus packages, that claim to protect you against malware. Yet it is questionable if they can actually offer much protection.
With a Windows or Mac computer, you can choose to install Administrator or root-level software which analyses files and the running processes. But as you may have guessed, this is not possible on Android and iOS.
On a phone, software can, at-most, check if there are programs with questionable names installed, or perhaps monitor your non-encrypted web traffic. This provides little protection against malware (that does not follow official developer guidelines) from gaining root-access on your phone.
With Okay, one of our fundamental assumptions is that all devices already have some sort of malware, is vulnerable to malware, or will be vulnerable to malware very soon. This is perhaps a pessimistic view, but it is necessary when the stakes are so high. Aka, sensitive user information.
Across the world, the daily value of transactions verified on phones is certainly hundreds of millions of euros, if not more. For criminals, this is a very tempting target, which is why we aim to make security around authentication and transaction as strong as possible.