Select your localized edition:

Close ×

More Ways to Connect

Discover one of our 28 local entrepreneurial communities »

Be the first to know as we launch in new countries and markets around the globe.

Interested in bringing MIT Technology Review to your local market?

MIT Technology ReviewMIT Technology Review - logo


Unsupported browser: Your browser does not meet modern web standards. See how it scores »

{ action.text }

Although antivirus companies such as McAfee continue to warn that malware is a potential threat to smart phones, it has yet to become a huge problem. In fact, some security researchers argue, it should never be a problem, because of differences between the mobile and PC platforms. Applications for Apple’s iPhone, for example, all come from the App Store. Phones that use Google’s Android can download software from anywhere, but Google is able to remove programs remotely. “If we really need antivirus on current smart phones, something really went wrong,” says Collin Mulliner, a PhD student at the Technical University of Berlin, who knows Hering and Mahaffey from their Bluetooth research days.

Attackers are, however, starting to exploit the particular weaknesses of smart phones, and Lookout has to regularly update its service to detect the latest known threats. In February, a Trojan horse known as DroidDream infected hundreds of thousands of Android phones. Lookout detected other programs in the Android app marketplace with the same malicious code and notified Google. In May, the same attacker tried again with a simpler version, known as DDLite, and Lookout blocked it again.

Despite the battle between malware writers and companies like Lookout, the problem of malware is a sideshow compared the bigger problem of device management, says Andrew Jaquith, chief technology officer of Perimeter E-Security and a former analyst who covered the mobile market. “In the end, it is management that is wagging the dog, not security,” Jaquith says. “And in that space, in terms of implementation, there’s Lookout and then there’s everyone else.”

0 comments about this story. Start the discussion »

Credit: Gabriela Hasbun

Tagged: Business, Business Impact, Securing Data

Reprints and Permissions | Send feedback to the editor

From the Archives


Introducing MIT Technology Review Insider.

Already a Magazine subscriber?

You're automatically an Insider. It's easy to activate or upgrade your account.

Activate Your Account

Become an Insider

It's the new way to subscribe. Get even more of the tech news, research, and discoveries you crave.

Sign Up

Learn More

Find out why MIT Technology Review Insider is for you and explore your options.

Show Me