Mobile Security Tom Taylor. Roadmap Security Risks Security Risks Examples of Attacks Examples of Attacks Personal Protection Personal Protection Business.

Slides:



Advertisements
Similar presentations
ATK Space 9617 Distribution Avenue San Diego, California Tel: (858) Fax: (858) Website:
Advertisements

Kadra Alvaro April,2010. Introduction: The Android Platform Threats to Smartphones Android-Specific Threats How to Secure Your Android Device The Future.
Android Enterprise Applications Internet Security CIS 471 Bryce Sumida.
Dissecting Android Malware : Characterization and Evolution
MOOC on M4D 2013 I NTRODUCTION TO THE A NDROID P LATFORM Ashish Agrawal Indian Institute of Technology Kanpur.
SECURITY CHECK Protecting Your System and Yourself Source:
7 Effective Habits when using the Internet Philip O’Kane 1.
Security for Today’s Threat Landscape Kat Pelak 1.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Automated Remote Repair for Mobile Malware Yacin Nadji, Jonathon Giffin, Patrick Traynor Georgia Institute of Technology ACSAC’ 11.
Android Malware Characterisaion. Android Under Attack Android Malware is on the rise In 2012 malware presence has increased by 580% compared to the same.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
 Smartphone overview › Platform comparison  App Construction  Smartphone malware and viruses  Security threats  Keeping your Smartphone clean.
Access · convergence · management security · performance Margins in Mobility – Ian Kilpatrick, Wick Hill.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
William Enck, Machigar Ongtang, and Patrick McDaniel.
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
Presentation By Deepak Katta
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Introduction to Mobile Malware
Sophos Mobile Security
Security for Seniors SeniorNet Help Desk
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Securing Your Android Device Terry Labach Information Security Services, IST.
Mobile Operating System Security A PRESENTATION BY DANIEL ADAMS CSC 345 DR. BOX.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
Malware and Spyware Attacking Cell Phones Chris Gooch, Jessica Russell, Destiny Logan.
Lightweight Mobile Applications Certification: Prepared By: Rahul Biswas.
 Security and Smartphones By Parker Moore. The Smartphone Takeover  Half of mobile phone subscribers in the United States have a smartphone.  An estimated.
All Your Droid Are Belong To Us: A Survey of Current Android Attacks 단국대학교 컴퓨터 보안 및 OS 연구실 김낙영
Staying Safe Online Keep your Information Secure.
1 Company Proprietary and ConfidentialThe document name can go here Android OS Security Omar Alaql July 8, 2013 Kent State University Android OS Security.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Android Security Auditing Slides and projects at samsclass.info.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
ANDROID BY:-AANCHAL MEHTA MNW-880-2K11. Introduction to Android Open software platform for mobile development A complete stack – OS, Middleware, Applications.
Small Business Security Keith Slagle April 24, 2007.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
Computer Skills and Applications Computer Security.
Protecting Your Computing Devices Antivirus, Anti-Spyware, Ad blocking, Antitheft and OS Maintenance.
MobileSecurity Vulnerability Assessment Tools for the Enterprise Mobile Security Vulnerability Assessment Tools for the Enterprise Integrating Mobile/BYOD.
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
Introducing the Smartphone Pentesting Framework Georgia Weidman Bulb Security LLC Approved for Public Release, Distribution Unlimited.
Cybersecurity Test Review Introduction to Digital Technology.
NESSUS. Nessus Vulnerability Scanner Features: Ease of use Deep Vulnerability Analysis Discover network based and local vulnerabilities Perform configuration.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
TECHDOTCOMP SUPPORT TECHDOTCOMP nd Ave, Seattle, WA 98122, USA Phone:
KASPERSKY INTERNET SECURITY multi-device  Average number of devices in households: 4.5  Consumer device diversity will continue to expand.
Mobile Device Security Threats Christina Blakley Host Computer Security.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
DeepDroid Dynamically Enforcing Enterprise Policy Manwoong (Andy) Choi
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Android and IOS Permissions Why are they here and what do they want from me?
Securing the Human. Presented by Thomas Nee, Computer Coordinator Town of Hanover, Massachusetts hanover-ma.gov/information-technology October is Cyber.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Which is better Avast Free Edition or Avast Pro Version?
Managing Windows Security
Computer Virus and Antivirus

Industry Best Practices – Security For Smartphones / Mobile Devices

Security in mobile technologies

Presentation transcript:

Mobile Security Tom Taylor

Roadmap Security Risks Security Risks Examples of Attacks Examples of Attacks Personal Protection Personal Protection Business Protection Business Protection Measures companies taking to protect users Measures companies taking to protect users

Types of Attacks Malware Malware Premium SMS Billing Premium SMS Billing -SMS Phishing -SMS Phishing Spyware Spyware Malicious Sites Malicious Sites

Malware Android highest risk Android highest risk 90% kernel with vulnerability 90% kernel with vulnerability Applications “Apps” Applications “Apps” Malicious code Malicious code

Spyware Installed on your phone Installed on your phone Can track your location, track calls, messages etc Can track your location, track calls, messages etc May be hidden from lists of applications May be hidden from lists of applications

Attacks Ralf-Phillip Weinmann discovered compromise unprotected smartphones Ralf-Phillip Weinmann discovered compromise unprotected smartphones Gemini Gemini Zitno Zitno DroidDream DroidDream

Gemini Attached to legitimate applications Attached to legitimate applications Chinese app stores Chinese app stores Official apps not effected Official apps not effected

Zitno Zeus in Mobile Zeus in Mobile Trojan targeting banking Trojan targeting banking Captures SMS Messages Captures SMS Messages Windows Mobile, Symbian, Blackberry Windows Mobile, Symbian, Blackberry

DroidDream Android Market Android Market Hiding Look-a-like versions Hiding Look-a-like versions 200,000 downloads in few days 200,000 downloads in few days

Defense

General Rules Do not loose your phone Do not loose your phone Install “finding” software Install “finding” software Password Protect your phone Password Protect your phone Checking application permissions Checking application permissions

The Specifics Block options for SMS billing through carrier Block options for SMS billing through carrier Safe Browsing Safe Browsing VPNS VPNS

Business Security Work issued cell-phones Work issued cell-phones Zenprise – scan all smartphones in infrastructure Zenprise – scan all smartphones in infrastructure Mobile Security Policy Mobile Security Policy

Company Procedures Google – Android Bouncer Google – Android Bouncer Remote removal of malware Remote removal of malware Sandboxing Sandboxing iPhone – strict approval process iPhone – strict approval process

Anti-Virus Lookout Lookout Mcafee Mcafee Kasperspy Kasperspy Avast Avast Norton Norton

Conclusion Types of Attacks Types of Attacks Attacks that have happened Attacks that have happened Defense – General and Specific Rules Defense – General and Specific Rules Company Procedures Company Procedures

References “Android Trojan with botnet capabilities found in the wild”. Help Net Security. Help Net Security. Dec Web. Apr “Android Trojan with botnet capabilities found in the wild”. Help Net Security. Help Net Security. Dec Web. Apr “App kill-switch: the last line of defence”. European Network and Information Security Agency.ENISA. n.d. Web. Apr “App kill-switch: the last line of defence”. European Network and Information Security Agency.ENISA. n.d. Web. Apr Brustein, Joshua. “Smartphone Security Blankets”. The New York Times. The New York Times Company. Feb Web. Apr Brustein, Joshua. “Smartphone Security Blankets”. The New York Times. The New York Times Company. Feb Web. Apr Gahran, Amy. “Mobile phone security: What are the risks?”. CNN. Turner Broadcasting System, Inc. Jun Web. Apr Gahran, Amy. “Mobile phone security: What are the risks?”. CNN. Turner Broadcasting System, Inc. Jun Web. Apr King, Rachel. “Many Mobile users are uneasy about smartphone security”. ZDNet. CBS Interactive. Oct Web. Apr King, Rachel. “Many Mobile users are uneasy about smartphone security”. ZDNet. CBS Interactive. Oct Web. Apr Lockheimer, Hiroshi. “Android and Security”. Google Mobile Blog. Google. Feb Web. Apr Lockheimer, Hiroshi. “Android and Security”. Google Mobile Blog. Google. Feb Web. Apr Rose, Brent. “Smartphone Security: How to Keep Your Handset Safe”. PCWorld. PCWorld Communications, Inc. Jan Web. Apr Rose, Brent. “Smartphone Security: How to Keep Your Handset Safe”. PCWorld. PCWorld Communications, Inc. Jan Web. Apr Swanson, Kris. “Just how smart is your smartphone security strategy?”. VentureBeat. VentureBeat. Mar Web. Apr Swanson, Kris. “Just how smart is your smartphone security strategy?”. VentureBeat. VentureBeat. Mar Web. Apr Thompson, Jon. “Smartphone Security: what you need to know”. Techradar. Future Publishing Limited. Feb Web. Apr Thompson, Jon. “Smartphone Security: what you need to know”. Techradar. Future Publishing Limited. Feb Web. Apr Security.jpg?t= Security.jpg?t= Security.jpg?t= Security.jpg?t= content/uploads/2009/07/Custom-Application-Development.jpg content/uploads/2009/07/Custom-Application-Development.jpg

Questions