Trusteer wants to make Android and IOS more secure

WEB INSECURITY FIRM Trusteer has announced it will work with smartphone application developers to integrate its security software with applications.
Trusteer, known best for its Rapport software that is provided by some banks to protect their customers, has developed Worklight, a way of detecting malware on mobile devices. Now Trusteer is starting to work with IOS, Android and Blackberry developers to get its software incorporated into applications.
Developers will be urged to use Trusteer's Worklight Mobile, which includes the firm's Secure Web Access software that aims to detect malware on smartphones. Aside from malware detection, it also provides reporting capabilities that are particularly useful for enterprises so administrators can identify infected devices remotely.
Aside from malware detection, Trusteer says it will be working on tamper resistant security libraries and detection of SMS based phishing attacks.
The issue of security on smartphones was highlighted by the glut of malware that has appeared on Google's Android Market. Since then, Google has released a 'kill switch' to contain the spread of malware on Android devices.
However it seems that Trusteer doesn't think Google's actions are enough, with Ron Perry, CTO for Worklight saying, "With this latest addition to our capabilities, made possible by integrating with Trusteer's leading protection technology, WorkLight will uniquely provide customers with safeguards against increasingly frequent and sophisticated mobile malware attacks." That sort of talk makes you wonder whether you could catch a virus by just touching a smartphone infested with malware.
In the case of Google's Android operating system, the ability to integrate such security mechanisms without having to pay for them exists thanks to its open source nature.
However with Apple, Research in Motion and Microsoft sticking to closed source mobile operating systems, there will always be enough room for insecurity firms to make money. ยต

0 comments: