Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime.
1 Alcatel Onetouch Antivirus. 2 Thinking about security on your smartphone Alcatel OneTouch? We have the solution. Among the applications on your smartphone,
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Security for Today’s Threat Landscape Kat Pelak 1.
Backup Modernization with NetBackup Appliances
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Mobile Phone Theft. Serving our communities and protecting them from harm Introduction Mobile Phone Theft There were an estimated 742,000 victims of mobile.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Presentation By Deepak Katta
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Introduction to Mobile Malware
Sophos Mobile Security
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
INTEROP 2014 Mobile Issues in the Network. Mobile Issues Data loss – Hardware theft or failure – Data corruption Data theft – Hardware theft – Spyware,
Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
1 Safely Using Shared Computers Amanda Grady December 2013.
President’s Forum and WSML 2012 Mobile Market Dynamics Deborah Clark, Dawn Davis, Brian Duckering, Marie Pettersson 1 “A Day in the Life of a Mobile Family”
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
The current state of Cybersecurity Targeted and In Your Pocket Dale “Dr. Z” Zabriskie CISSP CCSK Symantec Evangelist.
Internet Safety Internet Safety LPM
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Protecting Your Computing Devices Antivirus, Anti-Spyware, Ad blocking, Antitheft and OS Maintenance.
The “Five W’s” of Mobile Device Malware: W ho, W hat, W hen, W here, and W hy? … and What Can be Done About It? Kevin McPeak, CISSP, ITILv3 Technical Architect,
Copy to Tape TOI. 2 Copy to Tape TOI Agenda Overview1 Technical Feature Implementation2 Q&A3.
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Partner Proctored Assessment Registration Process Ajit Jha 1 Partner Assessment.
Cyber Security in the Post-AV Era Amit Mital Chief Technology Officer General Manager, Emerging Endpoints Business Unit.
Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Mobile Money 1/37 Fiserv Mobile Money Staff Education © 2010 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. All trademarks.
TECHDOTCOMP SUPPORT TECHDOTCOMP nd Ave, Seattle, WA 98122, USA Phone:
Kaspersky Small Office Security INTRODUCING New for 2014!
Mobile Device Security Threats Christina Blakley Host Computer Security.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Android and IOS Permissions Why are they here and what do they want from me?
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Activate your McAfee on Support for McAfee
Advanced Endpoint Security Data Connectors-Charlotte January 2016
BUILD SECURE PRODUCTS AND SERVICES
The time to address enterprise mobility is now
Trend Micro Consumer 2010 Easy. Fast. Smart.
Computer Virus and Antivirus
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Call For Norton Customer Service. customerservice.com/norton- customer-service.html.
 Security is a must today. If your device is not secure with updated antivirus then it is surely vulnerable to the attacks of dangerous viruses, spyware.
12/5/2018 2:50 AM How to secure your front door with real-time risk assessments of your logons Jan Ketil Skanke COO and Principal Cloud Architect CloudWay.
Put your business in the front seat
Security in mobile technologies
G061 - Network Security.
Presentation transcript:

Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled

Presenting Norton Mobile Security

About Norton Mobile Security Form Factor TabletsSmart Phones Operating system AndroidiOS Anti Theft Locate/ Wipe/ Lock SIM Card Removal Lock Mobile Security Anti Virus/ Anti Malware/ Anti Phishing Scanning of SD Card / App Downloads/ App Updates Value / convenience Contacts Backup onto Norton Cloud Call & SMS Blocker Intelligent Live Updates with Roaming Detection Phone Protection Identity Protection Privacy Protection

Norton Mobile and Anti-Theft SMS Anti-Theft Simple, Fast, Effective Web Anti-Theft Simple & Effective: One service, many devices and platforms Locate ; Lock ; Wipe ; Lost Notice etc

“Scream” Locator Erik Evens Scream[********]

Sneak peak feature  Helps to protect the important stuff on your tablet/ phone against theft.  Set off a "scream" alarm if you misplace your phone or tablet so you can easily find it, even if the volume is set to silent or vibrate.  Get the location of your missing device on a map to help you find it fast.  Display a customizable message to anyone who finds your missing device, so you can make arrangements to get it back.  Take a photo of anyone using your device, when in "lost mode". (Front Facing Camera - enabled devices only) Benefits – NMS Anti Theft 7

SIM Card Removal Lock Supports different passcodes Detects when SIM card is removed Makes the phone/ tablet REDUNDANT without the right passcode

Anti-Malware & Anti-Phishing 9

Call & SMS Blocking Blocks both nuisance calls and text messages Can add to blacklist from call log, SMS log or through manual entry Calls and SMS still listed in the respective logs

PAUSES APP updates automatically when on ROAMING Intelligent LiveUpdate with Roaming Detection

Paying with Privacy Source: Symantec Android APK Download and Tracking System

Benefits – of Mobile Security Stop Mobile threats before they can infect your Android™ / iOS  Protect against viruses, malware and other mobile threats.  Gives you the power to eliminate mobile spam by blocking unwanted calls and texts.  Automatically scan downloaded apps and app updates for threats and gets rid of them.  Automatically scan SD (Secure Digital) memory cards for threats when you plug them into your mobile device. 13

Norton’s Competitive Advantages McAfee Feature Comparison:Norton Advantage: No SIM card lock When a phone is stolen, your SIM card can be removed immediately which renders security software useless. Norton stays one step ahead of thieves by providing an automatic SIM card lock. If your SIM card is removed at any time, your device will automatically lock and will be rendered useless unless you have the unlock pass code. No Intelligent Live Update with Roaming Detection This feature automatically detects subscriber to be out of home network and pauses any updates to apps, saving valuable data roaming charges for customer No Sneak Peek Sneak Peek is a very compelling feature as it allows a user to remotely take photos from the front-facing camera when the device is in “Lost mode”. This can be used along with location to locate the device and potentially identify the user of the device, improving the odds of device retrieval. No Scream Even if the phone is on silent mode, there will be an alarm once the scream command is sent to the phone System Check / Jail BreakUnsecure WIFI DetectionBackup Photos/ Other Files Clear Roadmap

Thank you! Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Ritesh Chopra Ramesh Rajamani

Trojan Posing as Netflix App A Trojan was released that looked very similar to the real Netflix for Android app. The fake app was used to collect account information and send it to a remote server. Demand for an Netflix app for Android is high, making a fake app like this particularly dangerous. App used to steal Netflix user account information 16

Android Threats Landscape Android bug lets attackers install malware without warning ( How Android Malware makes money ( makes-money#fbid=SaoeCMRzBnW) Exploit-powered Android Trojan uses update attack ( rojan_uses_update_attack.html) China’s unofficial Android app stores are malware minefields - As many as 95% Android users are at risk ( Madden NFL 12 app targeted with premium rate SMS trojan (

18