6 Security Threats Engulfing Mobile
-
Upload
ajeet-singh -
Category
Mobile
-
view
15.775 -
download
0
Transcript of 6 Security Threats Engulfing Mobile
THREATS ENGULFING MOBILE
The inexorable cyber hackers are always on the
hunt for their next big coup, and now the next target
seems to be that small rock in the pocket called
‘smartphone’.
Introduction
This ‘small rock’ has become the universe and hope it doesn’t end up being the graveyard for all.
“Every passing minute, we are witnessing about half a million attack attempts that are happening in cyberspace.” says Derek Manky, Fortinet global security strategist.
As the number of mobile devicesare soaring high...
...so is finding the weakest link in the chain.
1. Apps That Dig Corporate Information
Enterprises face a huge threat from the apps that dig corporate
information beyond realization.Employees give away confidential,
personal and corporate informationto these apps without thinking twice.
The data can be sent to remote servers and other advertising networks, which
are easily accessible to the cyber criminals.
They can be mined by the hostile governments seeking access to
confidential corporate information via hacking their networks.
How do they attack you?
1. Apps That Dig Corporate Information
Did you know?
Gartner says: By 2017, 75% of the attacks would be via apps and not through critical technical attacks on the OS.
Mobile payment is no more a new term, with this endless advantages of being
lucid and user friendly and on the go mobile cash, there are severe risks
associated with this system as well.
2. Mobile Payment Services
The black hat hackers will not do it by breaching the payment processing
algorithms, but via analysis of the entire payment workflow, and figure
out the loophole.
2. Mobile Payment ServicesHow do they attack you?
They will identify the bypass measures and vulnerabilities, mostly leading to credit card
information fraud, unauthorized use and extortion.
3. Infected Mobile Devices
An infected mobile device allows the cyber criminals to easily
breach an organization’s perimeter and directly attack all
the devices on that particular network.
3. Infected Mobile Devices
If the hacker manages to infect a mobile device and take control over it, he can take
two paths. Either he chooses the traditional path of stealing his contacts and sending texts,
or if the device is connected to a WiFi, he can attack the additional systems on that
network.
How do they attack you?
4. Mobile PhishingThere has been a volcanic eruption of mobile devices and it seems no one is able to save themselves from the surge of its magma.
Most of these handsets have preloaded applications, and validation negligence can
lead to remote device hijacking.
4. Mobile PhishingNew smartphone owners are not used to the security concerns and may connect to unsecured AP/Wifi connections.
These connections don’t encrypt datacommunicating through that network and will
lead to rise in man in the middle attack.
How do they attack you?
This results in…
Severe data leakage like user credentials, etc., through
insecure apps which the hackers can eavesdrop, over a period of
time.
Mobile based browser hacking is one of the most efficient ways to compromise the entire mobile device.
5. Mobile Web Based Hacking
Exploiting the browser vulnerability enables the hacker to bypass myriad system level security measures.
Like WebKit based exploits enables the hacker to bypass a browser’s sandbox followed by OS exploits to access the crux of the system and gain full control over the device.
5. Mobile Web Based HackingHow do they attack you?
6. Malware Progression
Malware has a clear progression these days. They start with indulging the unsuspecting users who are more viable to open, unknown attachments, or install not known applications and harness the user’s crucial information from that.
6. Malware Progression
Hackers use malicious apps to send premium SMS or other lucrative offers, getting the users to install the malicious app, and then the malware starts hunting for the bank credentials.
How do they attack you?
The SlemBunk attack is one of the glaring examples of this type of attack. And these attacks time and again ensure that your mobile device needs a complete security solution sooner than later.
THE ENEMY IS US… despite 24*7 reliance on mobile phone we don’t seem to get any smarter.
Experts agree that malware and mobile attacks will keep on increasing as more and more people keep packing their phones with rich
and sensitive data.
Conclusion
THE ENEMY IS US… despite 24*7reliance on mobile phone we don’tseem to get any smarter.Experts agree that malware andmobile attacks will keep onincreasing as more and more peoplekeep packing their phones with richand sensitive data.
Official Blog Link -https://mobileappninjas.wordpress.com/2016/03/15/top-
mobile-security-threats/
Mail us at: [email protected] us at: +1-877-284-1028
THANK YOU