Presentation is loading. Please wait.

Presentation is loading. Please wait.

Mobile Security Tom Taylor. Roadmap Security Risks Security Risks Examples of Attacks Examples of Attacks Personal Protection Personal Protection Business.

Similar presentations


Presentation on theme: "Mobile Security Tom Taylor. Roadmap Security Risks Security Risks Examples of Attacks Examples of Attacks Personal Protection Personal Protection Business."— Presentation transcript:

1 Mobile Security Tom Taylor

2 Roadmap Security Risks Security Risks Examples of Attacks Examples of Attacks Personal Protection Personal Protection Business Protection Business Protection Measures companies taking to protect users Measures companies taking to protect users

3 Types of Attacks Malware Malware Premium SMS Billing Premium SMS Billing Email-SMS Phishing Email-SMS Phishing Spyware Spyware Malicious Sites Malicious Sites

4 Malware Android highest risk Android highest risk 90% kernel with vulnerability 90% kernel with vulnerability Applications “Apps” Applications “Apps” Malicious code Malicious code

5 Spyware Installed on your phone Installed on your phone Can track your location, track calls, messages etc Can track your location, track calls, messages etc May be hidden from lists of applications May be hidden from lists of applications

6 Attacks Ralf-Phillip Weinmann discovered compromise unprotected smartphones Ralf-Phillip Weinmann discovered compromise unprotected smartphones Gemini Gemini Zitno Zitno DroidDream DroidDream

7 Gemini Attached to legitimate applications Attached to legitimate applications Chinese app stores Chinese app stores Official apps not effected Official apps not effected

8 Zitno Zeus in Mobile Zeus in Mobile Trojan targeting banking Trojan targeting banking Captures SMS Messages Captures SMS Messages Windows Mobile, Symbian, Blackberry Windows Mobile, Symbian, Blackberry

9 DroidDream Android Market Android Market Hiding Look-a-like versions Hiding Look-a-like versions 200,000 downloads in few days 200,000 downloads in few days

10 Defense

11 General Rules Do not loose your phone Do not loose your phone Install “finding” software Install “finding” software Password Protect your phone Password Protect your phone Checking application permissions Checking application permissions

12 The Specifics Block options for SMS billing through carrier Block options for SMS billing through carrier Safe Browsing Safe Browsing VPNS VPNS

13 Business Security Work issued cell-phones Work issued cell-phones Zenprise – scan all smartphones in infrastructure Zenprise – scan all smartphones in infrastructure Mobile Security Policy Mobile Security Policy

14 Company Procedures Google – Android Bouncer Google – Android Bouncer Remote removal of malware Remote removal of malware Sandboxing Sandboxing iPhone – strict approval process iPhone – strict approval process

15 Anti-Virus Lookout Lookout Mcafee Mcafee Kasperspy Kasperspy Avast Avast Norton Norton

16 Conclusion Types of Attacks Types of Attacks Attacks that have happened Attacks that have happened Defense – General and Specific Rules Defense – General and Specific Rules Company Procedures Company Procedures

17 References “Android Trojan with botnet capabilities found in the wild”. Help Net Security. Help Net Security. Dec 30 2010. Web. Apr 7 2012. “Android Trojan with botnet capabilities found in the wild”. Help Net Security. Help Net Security. Dec 30 2010. Web. Apr 7 2012. “App kill-switch: the last line of defence”. European Network and Information Security Agency.ENISA. n.d. Web. Apr 7 2012. “App kill-switch: the last line of defence”. European Network and Information Security Agency.ENISA. n.d. Web. Apr 7 2012. Brustein, Joshua. “Smartphone Security Blankets”. The New York Times. The New York Times Company. Feb 17 2012. Web. Apr 7 2012. Brustein, Joshua. “Smartphone Security Blankets”. The New York Times. The New York Times Company. Feb 17 2012. Web. Apr 7 2012. Gahran, Amy. “Mobile phone security: What are the risks?”. CNN. Turner Broadcasting System, Inc. Jun 17 2011. Web. Apr 7 2012. Gahran, Amy. “Mobile phone security: What are the risks?”. CNN. Turner Broadcasting System, Inc. Jun 17 2011. Web. Apr 7 2012. King, Rachel. “Many Mobile users are uneasy about smartphone security”. ZDNet. CBS Interactive. Oct 31 2011. Web. Apr 7 2012. King, Rachel. “Many Mobile users are uneasy about smartphone security”. ZDNet. CBS Interactive. Oct 31 2011. Web. Apr 7 2012. Lockheimer, Hiroshi. “Android and Security”. Google Mobile Blog. Google. Feb 2 2012. Web. Apr 7 2012. Lockheimer, Hiroshi. “Android and Security”. Google Mobile Blog. Google. Feb 2 2012. Web. Apr 7 2012. Rose, Brent. “Smartphone Security: How to Keep Your Handset Safe”. PCWorld. PCWorld Communications, Inc. Jan 10 2012. Web. Apr 7 2012. Rose, Brent. “Smartphone Security: How to Keep Your Handset Safe”. PCWorld. PCWorld Communications, Inc. Jan 10 2012. Web. Apr 7 2012. Swanson, Kris. “Just how smart is your smartphone security strategy?”. VentureBeat. VentureBeat. Mar 20 2012. Web. Apr 5 2012. Swanson, Kris. “Just how smart is your smartphone security strategy?”. VentureBeat. VentureBeat. Mar 20 2012. Web. Apr 5 2012. Thompson, Jon. “Smartphone Security: what you need to know”. Techradar. Future Publishing Limited. Feb 5 2012. Web. Apr 5 2012. Thompson, Jon. “Smartphone Security: what you need to know”. Techradar. Future Publishing Limited. Feb 5 2012. Web. Apr 5 2012. http://scm-l3.technorati.com/12/01/31/63477/Mobile- Security.jpg?t=20120131161837 http://scm-l3.technorati.com/12/01/31/63477/Mobile- Security.jpg?t=20120131161837 http://scm-l3.technorati.com/12/01/31/63477/Mobile- Security.jpg?t=20120131161837 http://scm-l3.technorati.com/12/01/31/63477/Mobile- Security.jpg?t=20120131161837 http://www.amcomsoftware.com/images/DoD_Logo_000.gif http://www.amcomsoftware.com/images/DoD_Logo_000.gif http://www.amcomsoftware.com/images/DoD_Logo_000.gif http://www.customapplicationdevelopment.org/wp- content/uploads/2009/07/Custom-Application-Development.jpg http://www.customapplicationdevelopment.org/wp- content/uploads/2009/07/Custom-Application-Development.jpg

18 Questions


Download ppt "Mobile Security Tom Taylor. Roadmap Security Risks Security Risks Examples of Attacks Examples of Attacks Personal Protection Personal Protection Business."

Similar presentations


Ads by Google