9
Mobile Security Treading Through the Unsafe World of Computing RAHUL NEEL MANI EDITOR-DYNAMICCISO.COM GREYHEAD MEDIA 2014

Mobile Security

Embed Size (px)

DESCRIPTION

You may be surprised that nearly 2.2 billion smartphones and tablets will be sold to end users in 2014. With the number of smartphones and tablets on the increase and adoption of enterprise mobile computing on the rise, security breaches, malware attacks and exploitation of application vulnerability on mobile devices are maturing. By 2017, Gartner predicts that the focus of endpoint breaches will shift to tablets and smartphones. That indicates how important the subject of Mobile Security is and going to be in the future.

Citation preview

Page 1: Mobile Security

Mobile SecurityTreading Through the Unsafe World

of Computing RAHUL NEEL MANI

EDITOR-DYNAMICCISO.COMGREYHEAD MEDIA

2014

Page 2: Mobile Security

Top Free & Paid Apps with Risky Behavior

TOP PAID APPS WITH RISKY BEHAVIORS: iOS & ANDROID

TOP FREE APPS WITH RISKY BEHAVIORS: IOS & ANDROID

SOURCE: APPTHORITY SUMMER 2014 APP REPUTATION REPORT

Page 3: Mobile Security

Cumulative Breakdown of Android Apps

14% 15%

14%

13%

6%

38%

MALICIOUS

SUSPICIOUS

UNWANTED

MODERATE

BENIGN

TRUSTWORTHY

THIS CHART REPRESENTS AN ANALYSIS OF 4 MILLION ANDROID APPS. TOTAL THREAT TO ANDROID DEVICES ROSE 384% IN COMPARISON TO 2012 DATA. SOURCE: WEBROOT REPORT 2013

Page 4: Mobile Security

Cumulative Breakdown of iOS APPS

MODERATE7%

92%

1%

TRUSTWORTHY

BENIGN

THESE CLASIFICATIONS REPRESENT OVER 1 MILLION ANALYZED iOS APPS. SOURCE: WEBROOT REPORT 2013

Page 5: Mobile Security

What Data is Most Often Collected

SOURCE: APPTHORITY SUMMER 2014 APP REPUTATION REPORT

POPULARITY OF FREE APPS COMES AT A HUGE PRICE PAID TOWARDS PRIVACY AND SECURITY. YOUR APP IS FREE BUT YOUR PERSONAL DATA IS COMPROMISED

82% of top android free apps and 50% of top iOS free apps track user’s location followed by accessing address book and calendars

Page 6: Mobile Security

Where Does the Data Go

SOURCE: APPTHORITY SUMMER 2014 APP REPUTATION REPORT

71% of top free Android apps and 32% of top free iOS apps share your data with ad networks

WHAT IF THE APP IS FREE, THE DEVELOPERS HAVE WAYS TO GENERATE REVENUES

Page 7: Mobile Security

Mobile Malware: Spreading Faster

• In 2013 the rate of growth in the appearance of new mobile malware, which almost exclusively targets the Android platform, was far greater than the growth rate of new malware targeting PCs. In the last two quarters reported, new PC malware growth was nearly flat, while appearances of new Android samples grew by 33%. MCAFEE LABS 2014 THREAT PREDICTIONS

South Africa1.29%Romania 1.27%Japan: 0.93%Indonesia 0.80%Poland 0.77%Lithuania 0.50%

SOU

RCE:

FO

RNIN

ET 2

014

THRE

AT L

AND

SCAP

E RE

PORT

Page 8: Mobile Security

Prevalence of Mobile Malware Infections, 2013

SOURCE: FORNINET 2014 THREAT LANDSCAPE REPORT

Page 9: Mobile Security

How’s It Harming

Trojans are currently the most common type of Mobile Malware. Most Trojans engage in one of the following activities:

– SMS Sending: Silently send SMS to premium-rate numbers or SMS-based subscription service

– File or App Downloading: Download and install unsolicited files or apps on the device

– Location Tracking: Silently track the device’s GPS location and/or audio or video to monitor users

– Bank Frauds: Silently monitor or divert banking related SMS messages– Data Stealing: Steal personal data such as files, contacts, photos and

other details– Fee Charging: Charge a ‘Fee’ for use/update/installation of a

legitimate (and usually free app)