Click me
Transcribed

The Rise Of Mobile Computing

FUTURE OF MOBILE 24 0.0.0 illl MORE USERS MEANS MORE PROBLEMS More functionality and adoption means more hackers are targeting mobile devices. Today, most malware is aimed at PC operating systems because they are the prevalent devices. This year marks the first year that smartphones will out sell all other computers combined, including mainframe computers, desktops, laptops, and tablet PCs. Mobile Malware Predictions 2005: 52 mobile malware apps 2010: 2500 mobile malware apps (98% increase from 2005) 2020 projection: 120,000 malware apps (based on % increase from 2005 to 2010) 800 600 400 200 2009 2010 2015* *2015 projection based on a 55% increase seen from 2009 to 2010 MOBILE SECURITY BY THE NUMBERS 10% of iPhone users use 0000 as their password: too easy. 13% of smartphone users have antivirus software, 95% of PC users have antivirus. 90% of mobile devices wilI have Wi-Fi by 2014. Users are 30% more likely to click on an unsafe link on mobile device. A mobile device is lost or stolen every 5 seconds. Mobile users are 3 times more likely to give login information to phishing sites on their mobile versus their PC. iPhone users are 8 times more likely to access phishing websites than Blackberry users. 4% of smartphones and pads shipped in mobile security downloaded and installed; by 2015, that number is expected to be 20%. MOBILE PLATFORM MARKET SHARE 4% PALM 2% SYMBIAN 6% MS 10% MS 36% 22% RESEARCH 42% RESEARCH IN MOTION ANDROID IN MOTION 24% ANDROID 27% 25% APPLE APPLE OCTOBER 2010 JULY 2011 327.9 MILLION ACTIVE MOBILE CUSTOMER CONNECTIONS 269.6 MILLION US POPULATION 6.9 BILLION WORLD POPULATION FUTURE AGE CONFIRMATION: Devices that can confirm if you are over 21 or old enough for a senior citizen discount. SECURITY SENSITIVE MEMBERSHIP VERIFICATION: Your USES OF MOBILE student discount. device holds your library card, gym membership, or eligibility for that DEVICES PROOF OF RESIDENCY: A device able to determine residency for facilities and services that are only available to residents of particular city or locality. ACCESS CONTROL: Replace your security badge with a smart phone that can protect physical access by determining if a user is allowed to enter MOTOROLA al 10.21PM Go gle a building. PAYMENT DEVICES: A device connected to your bank or credit card flash your phone as payment instead of pulling out a card and hold your account information, available discounts, and loyalty card data. PERSONAL IDENTIFICATION: When you've been pulled over for speeding, you can whip out your smart phone that holds your driver's license data as well as vehicle registration and insurance information. MOBILE ATTACK METHODS SMISHING/VISHING/PHISHING: Using SMS, voicemail, or email to get username & password data from a user. APP DOWNLOADS: Unfamiliar apps can launch malicious software, but also beware of app upgrades/version downloads. AndroidDream used a similar technique giving users an uninfected app to download then infecting the phone with a version release. CIOECUD ANDROID 4.0 CAN NOW WI-FI SNOOPING: When accessing a public Wi-Fi network or hot spot, others can access and exploit your phone data. PERFORM FACIAL DETECTION TO UNLOCK WORM/TROJANS/SPYWARE: Installs malicious software on your device that can steal your information, disable operation, or send infections to your entire contact list. YOUR PHONE. 10 Ways to Protect Business Users 1. Establish clear mobile device policy with user risk awareness and training. 2. Authenticate users and devices for data access. 3. Encrypt data at rest and secure connections for data in transit. 4. Install antivirus protection on all mobile devices. 5. Enforce firewall and intrusion detection systems (IDS) rules. 6. Download applications from known, trusted sources only. 7. Disable Bluetooth functionality when not in use. 8. Keep a secure backup of all device data. 9. Use screen locks and password protect the physical device. 10. Apply patches, virus updates, and run regular security scans. SOURCES http://www.comscore.com/layout/set/popup/layout/set/popup/Press_Events/Press_Releases/2010/12/comScore _Reports_October_2010_U.S._Mobile_Subscriber_Market_Share http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.html http://mashable.com/2011/08/12/mobile-malware/ https://www.mylookout.com/mobile-threat-report http://www.trusteer.com/blog/mobile-users-three-times-more-vulnerable-phishing-attacks http://www.networkworld.com/community/node/68980 https://www.mylookout.com/mobile-threat-report McAfee 2010/2011 study pdf http://www.bgr.com/2011/10/07/investment-in-mobile-security-to-climb-44-annually-through-2015/ (- Data Usage (MB)

The Rise Of Mobile Computing

shared by Rackspace on Feb 20
686 views
2 share
0 comments
Read more: http://www.rackspace.com/blog/mobile-security-smishing-vishing-and-the-rise-of-mobile-compute/

Category

Technology
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size