Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.

Slides:



Advertisements
Similar presentations
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Advertisements

Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Kadra Alvaro April,2010. Introduction: The Android Platform Threats to Smartphones Android-Specific Threats How to Secure Your Android Device The Future.
MOBILE DEVICES & THEIR IMPACT IN THE ENTERPRISE Michael Balik Assistant Director of Technology Perkiomen Valley School District.
What’s new in this release? September 6, Milestone Systems Confidential Milestone’s September release 2012 XProtect ® Web Client 1 Connect instantly.
6218 Mobile Devices- Are They Secure Enough for our Patient's Data? Presented By Aaron Hendriks, CISSP Other: Employee of University Health Network, Toronto,
SECURITY CHECK Protecting Your System and Yourself Source:
Latest Threats Against Mobile Devices Dave Jevans Founder, Chairman and CTO.
Smartphone Security How safe are you?. Main Points 1. Malware/Spyware 2. Other Mischief 3. How a phone might get infected 4. Staying Safe a. Malware b.
THE NEW IPAD Cami Velasquez. What is an iPad?  It is a tablet computer made by Apple Inc. that was released on April 3,  It has a high definition.
What Is Technology? Technology is scientific knowledge used in practical ways in industry, for example in designing new machines. By: Samuel, Jaden and.
WHAT IS TECHNOLOGY? BY JADEN, SAMUEL. TECHNOLOGY.
Shala Sylvester, Dejah Sanford, Stephanie Hicks, Tierra Beason.
This course is designed to give you a basic introduction to the ins and outs of using tablet and smartphone technology. By and large, you will learn the.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Digital Literacy.
Introduction Our Topic: Mobile Security Why is mobile security important?
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Securing Your Android Device Terry Labach Information Security Services, IST.
Cyber Crimes.
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
1 Monitoring mobile communication network, how does it work? How to prevent such thing about that? 潘維亞 (P ) 周明哲 (P ) 劉子揚 (N )
IT security By Tilly Gerlack.
App Rights or wrongs ? A look at smartphone apps or: why RTFM* is not just important for geeks and “computer types” * = Read The F+*#ing (or “Fine”) Manual.
Overview M OBILE A PPS. M OBILE A PPS D EFINITION - W HAT IS IT ? W HAT DOES IT DO ?  it is a term used to describe Internet applications that run on.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
GOTBACKUP THE BEST BACKUP SOLUTIONS. SIGN UP TODAY! CLICK HERECLICK HERE.
Protecting Your Computing Devices Antivirus, Anti-Spyware, Ad blocking, Antitheft and OS Maintenance.
MobileSecurity Vulnerability Assessment Tools for the Enterprise Mobile Security Vulnerability Assessment Tools for the Enterprise Integrating Mobile/BYOD.
FriendFinder Location-aware social networking on mobile phones.
Does my business need a mobile App?. In today's world of rapidly changing technology, we see in the information age that computers and websites were once.
Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
By: Symone Lee Noah Smith Sydney Quesada MYP Technology Period 8/9 Mr.Ochs.
Introducing the Smartphone Pentesting Framework Georgia Weidman Bulb Security LLC Approved for Public Release, Distribution Unlimited.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Policies and Security for Internet Access
NESSUS. Nessus Vulnerability Scanner Features: Ease of use Deep Vulnerability Analysis Discover network based and local vulnerabilities Perform configuration.
30 Apps for Librarians Sana Moulder & Bryson Kopf.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Mobile Device Security Threats Christina Blakley Host Computer Security.
Android and IOS Permissions Why are they here and what do they want from me?
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
IOS 9 - What’s new in iOS. Apple’s iOS 9 is now available for download for all iPhone, iPad, and iPod touch models that can run iOS 8. According to Apple,
DATA SECURITY FOR MEDICAL RESEARCH
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Introduction to Computers
Staying Austin College
CompTIA IT Fundamentals Study Guide (FC0-U51)
© EIT, Author Gay Robertson, 2017
Introduction to Mobile Devices
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Information Technology Services Education and Awareness Team
Swipe to Donate Life.
What you can do to support people to be safe online
Staying safe on the internet
Managing and Monitoring Screen Time
How to keep the bad guys out and your data safe
Information Technology Services Education and Awareness Team
Presentation transcript:

Convenience product security Collin Busch

What is a convenience product? A convenience product is a device or application that makes your life easier For the purpose of this presentation, we will examine different cell phones, apps, and the security behind them Security software such as findmyphone Browser security on mobile devices

The default By default, a brand new phone or tablet will not have basic levels of security There will be no password or lock until it is set up Different applications on the phone may handle their own security clients may use SSL/TLS depending on the client/server Browsers accessing certain websites may use https instead of http Certain programs such as banking apps may have built in encryption

Default vulnerabilities If you keep your device or program at base security, your entire phone is vulnerable. In the case of an iPhone or iPad, one swipe will let anyone access all of the data stored on your phone. The most important thing you can do to a mobile device to keep it safe is to require a passcode or pattern

Security Breach in IOS 7 Even if your device is protected by a password lock, it may still be accessible. Due to bugs or bad programming, a sequence of actions may allow you access to a mobile device. On an iPhone running IOS 7, you could bypass the lock screen without a passcode, and have access to the camera and stored photos as well as any app that would share these photos, such as Twitter, Facebook, and apps.

Patching IOS 7 breach In IOS it was documented that this breach was now closed, and that you could no longer bypass the IOS 7 lockscreen was released September , 8 days after IOS 7 was release and 7 days after the exploit was discovered. For an entire week, brand new software release by a huge and experienced software company had a gaping security hole A simple lock screen is not enough.

Android vulnerabilities Many android users are still using the “gingerbread” operating system, which is version to 2.3.7, which was released in This out of date OS has a number of vulnerabilities, including” SMS message trojans which continually text a premium rate unknown to the user, resulting in extremely high charges that are usually only noticed at the end of the month/billing cycle Rootkits: in 2011 a software developers rootkit was found on millions of android phones, which logged keystrokes, passwords, and user location data without the user’s knowledge Malicious google play software- the play store is not as strictly monitored as the Apple store, so there are a number of malware programs masquerading as legitimate programs.

Biometric bypassing The iPhone 5s implemented a fingerprint biometric scanner to allow “secure” access to the phone This biometric scanner was fooled when a hacking team photographed a fingerprint that had been left on a glass surface. Retina scanners can also be bypassed because the scanner reads the “code” of the retina without checking that there is actually an eye. Synthetic retina “codes” can be used to bypass most retina scanners, such as the one available for android. As demonstrated in the previous vulnerabilities, you need some sort of security past lock screens

How to protect yourself During web browsing, try to use sites that have in their header. You may be able to download software such as httpseverywhere to further secure browsers (this is also relevant on computers) Disable automatic connections so that your device does not automatically connect to what could be a wifi network that will steal data from your phone Encrypt your data so that if it is transmitted it is not realistically usable. Consider anti malware software- malware for both android and IOS exists

Works cited found-in-new-iphone-ios7-update/ found-in-new-iphone-ios7-update/ vulnerability #!JOv0m vulnerability #!JOv0m nothing-new/ nothing-new/ phones/ phones/