6 Security Threats Engulfing Mobile

24
THREATS ENGULFING MOBILE

Transcript of 6 Security Threats Engulfing Mobile

Page 1: 6 Security Threats Engulfing Mobile

THREATS ENGULFING MOBILE

Page 2: 6 Security Threats Engulfing Mobile

The inexorable cyber hackers are always on the

hunt for their next big coup, and now the next target

seems to be that small rock in the pocket called

‘smartphone’.

Introduction

Page 3: 6 Security Threats Engulfing Mobile

This ‘small rock’ has become the universe and hope it doesn’t end up being the graveyard for all.

Page 4: 6 Security Threats Engulfing Mobile

“Every passing minute, we are witnessing about half a million attack attempts that are happening in cyberspace.” says Derek Manky, Fortinet global security strategist.

Page 5: 6 Security Threats Engulfing Mobile

As the number of mobile devicesare soaring high...

...so is finding the weakest link in the chain.

Page 6: 6 Security Threats Engulfing Mobile
Page 7: 6 Security Threats Engulfing Mobile

1. Apps That Dig Corporate Information

Enterprises face a huge threat from the apps that dig corporate

information beyond realization.Employees give away confidential,

personal and corporate informationto these apps without thinking twice.

Page 8: 6 Security Threats Engulfing Mobile

The data can be sent to remote servers and other advertising networks, which

are easily accessible to the cyber criminals.

They can be mined by the hostile governments seeking access to

confidential corporate information via hacking their networks.

How do they attack you?

1. Apps That Dig Corporate Information

Page 9: 6 Security Threats Engulfing Mobile

Did you know?

Gartner says: By 2017, 75% of the attacks would be via apps and not through critical technical attacks on the OS.

Page 10: 6 Security Threats Engulfing Mobile

Mobile payment is no more a new term, with this endless advantages of being

lucid and user friendly and on the go mobile cash, there are severe risks

associated with this system as well.

2. Mobile Payment Services

Page 11: 6 Security Threats Engulfing Mobile

The black hat hackers will not do it by breaching the payment processing

algorithms, but via analysis of the entire payment workflow, and figure

out the loophole.

2. Mobile Payment ServicesHow do they attack you?

Page 12: 6 Security Threats Engulfing Mobile

They will identify the bypass measures and vulnerabilities, mostly leading to credit card

information fraud, unauthorized use and extortion.

Page 13: 6 Security Threats Engulfing Mobile

3. Infected Mobile Devices

An infected mobile device allows the cyber criminals to easily

breach an organization’s perimeter and directly attack all

the devices on that particular network.

Page 14: 6 Security Threats Engulfing Mobile

3. Infected Mobile Devices

If the hacker manages to infect a mobile device and take control over it, he can take

two paths. Either he chooses the traditional path of stealing his contacts and sending texts,

or if the device is connected to a WiFi, he can attack the additional systems on that

network.

How do they attack you?

Page 15: 6 Security Threats Engulfing Mobile

4. Mobile PhishingThere has been a volcanic eruption of mobile devices and it seems no one is able to save themselves from the surge of its magma.

Most of these handsets have preloaded applications, and validation negligence can

lead to remote device hijacking.

Page 16: 6 Security Threats Engulfing Mobile

4. Mobile PhishingNew smartphone owners are not used to the security concerns and may connect to unsecured AP/Wifi connections.

These connections don’t encrypt datacommunicating through that network and will

lead to rise in man in the middle attack.

How do they attack you?

Page 17: 6 Security Threats Engulfing Mobile

This results in…

Severe data leakage like user credentials, etc., through

insecure apps which the hackers can eavesdrop, over a period of

time.

Page 18: 6 Security Threats Engulfing Mobile

Mobile based browser hacking is one of the most efficient ways to compromise the entire mobile device.

5. Mobile Web Based Hacking

Page 19: 6 Security Threats Engulfing Mobile

Exploiting the browser vulnerability enables the hacker to bypass myriad system level security measures.

Like WebKit based exploits enables the hacker to bypass a browser’s sandbox followed by OS exploits to access the crux of the system and gain full control over the device.

5. Mobile Web Based HackingHow do they attack you?

Page 20: 6 Security Threats Engulfing Mobile

6. Malware Progression

Malware has a clear progression these days. They start with indulging the unsuspecting users who are more viable to open, unknown attachments, or install not known applications and harness the user’s crucial information from that.

Page 21: 6 Security Threats Engulfing Mobile

6. Malware Progression

Hackers use malicious apps to send premium SMS or other lucrative offers, getting the users to install the malicious app, and then the malware starts hunting for the bank credentials.

How do they attack you?

Page 22: 6 Security Threats Engulfing Mobile

The SlemBunk attack is one of the glaring examples of this type of attack. And these attacks time and again ensure that your mobile device needs a complete security solution sooner than later.

Page 23: 6 Security Threats Engulfing Mobile

THE ENEMY IS US… despite 24*7 reliance on mobile phone we don’t seem to get any smarter.

Experts agree that malware and mobile attacks will keep on increasing as more and more people keep packing their phones with rich

and sensitive data.

Conclusion

THE ENEMY IS US… despite 24*7reliance on mobile phone we don’tseem to get any smarter.Experts agree that malware andmobile attacks will keep onincreasing as more and more peoplekeep packing their phones with richand sensitive data.

Page 24: 6 Security Threats Engulfing Mobile

Official Blog Link -https://mobileappninjas.wordpress.com/2016/03/15/top-

mobile-security-threats/

Mail us at: [email protected] us at: +1-877-284-1028

THANK YOU