The team is set to release a report that identifies botnets as posing a significant threat to consumers.
The nefarious zombie nets are typically utilised to carry out denial of service attacks and shut down servers with an overwhelming wave of traffic.
"This is the perfect platform (for hackers)," said Patrick Traynor, an assistant professor of computer science at Georgia Tech and a contributor to its Emerging Cyber Threats report.
Indeed, most devices currently offer little more than substandard security protection. In addition, antivirus software, while effective, would rapidly drain massive amounts of battery life.
It should be noted that mobile operators maintain tight control over their networks, which could potentially facilitate a quick shut down of infected phones. As such, hackers may be forced to adapt their tactics to avoid detection.
Mobile phones are vulnerable to botnets
By
Aharon Etengoff
on Oct 16, 2008 2:08PM
Got a news tip for our journalists? Share it with us anonymously here.
Partner Content
Shared Intelligence is the Real Competitive Edge Partners Enjoy with Crayon
New Microsoft CSP rules? Here’s how MSPs can stay ahead with Ingram Micro
How Expert Support Can Help Partners and SMBs Realize the Full Value of AI
Beyond the box: How Crayon Is Redefining Distribution for the Next Era
How mandatory climate reporting is raising the bar for corporate leadership
Sponsored Whitepapers
Cut through the SASE confusion
Stay protected as cyber threats evolve
Defend Your Network from the Next Generation of AI Threats
The race to AI advantage is on. Don’t let slow consulting projects hold you back.
The changing face of Australian distribution




