6 Security Threats Engulfing Mobile

Post on 24-Jan-2018

15,775 views 0 download

transcript

THREATS ENGULFING MOBILE

The inexorable cyber hackers are always on the

hunt for their next big coup, and now the next target

seems to be that small rock in the pocket called

‘smartphone’.

Introduction

This ‘small rock’ has become the universe and hope it doesn’t end up being the graveyard for all.

“Every passing minute, we are witnessing about half a million attack attempts that are happening in cyberspace.” says Derek Manky, Fortinet global security strategist.

As the number of mobile devicesare soaring high...

...so is finding the weakest link in the chain.

1. Apps That Dig Corporate Information

Enterprises face a huge threat from the apps that dig corporate

information beyond realization.Employees give away confidential,

personal and corporate informationto these apps without thinking twice.

The data can be sent to remote servers and other advertising networks, which

are easily accessible to the cyber criminals.

They can be mined by the hostile governments seeking access to

confidential corporate information via hacking their networks.

How do they attack you?

1. Apps That Dig Corporate Information

Did you know?

Gartner says: By 2017, 75% of the attacks would be via apps and not through critical technical attacks on the OS.

Mobile payment is no more a new term, with this endless advantages of being

lucid and user friendly and on the go mobile cash, there are severe risks

associated with this system as well.

2. Mobile Payment Services

The black hat hackers will not do it by breaching the payment processing

algorithms, but via analysis of the entire payment workflow, and figure

out the loophole.

2. Mobile Payment ServicesHow do they attack you?

They will identify the bypass measures and vulnerabilities, mostly leading to credit card

information fraud, unauthorized use and extortion.

3. Infected Mobile Devices

An infected mobile device allows the cyber criminals to easily

breach an organization’s perimeter and directly attack all

the devices on that particular network.

3. Infected Mobile Devices

If the hacker manages to infect a mobile device and take control over it, he can take

two paths. Either he chooses the traditional path of stealing his contacts and sending texts,

or if the device is connected to a WiFi, he can attack the additional systems on that

network.

How do they attack you?

4. Mobile PhishingThere has been a volcanic eruption of mobile devices and it seems no one is able to save themselves from the surge of its magma.

Most of these handsets have preloaded applications, and validation negligence can

lead to remote device hijacking.

4. Mobile PhishingNew smartphone owners are not used to the security concerns and may connect to unsecured AP/Wifi connections.

These connections don’t encrypt datacommunicating through that network and will

lead to rise in man in the middle attack.

How do they attack you?

This results in…

Severe data leakage like user credentials, etc., through

insecure apps which the hackers can eavesdrop, over a period of

time.

Mobile based browser hacking is one of the most efficient ways to compromise the entire mobile device.

5. Mobile Web Based Hacking

Exploiting the browser vulnerability enables the hacker to bypass myriad system level security measures.

Like WebKit based exploits enables the hacker to bypass a browser’s sandbox followed by OS exploits to access the crux of the system and gain full control over the device.

5. Mobile Web Based HackingHow do they attack you?

6. Malware Progression

Malware has a clear progression these days. They start with indulging the unsuspecting users who are more viable to open, unknown attachments, or install not known applications and harness the user’s crucial information from that.

6. Malware Progression

Hackers use malicious apps to send premium SMS or other lucrative offers, getting the users to install the malicious app, and then the malware starts hunting for the bank credentials.

How do they attack you?

The SlemBunk attack is one of the glaring examples of this type of attack. And these attacks time and again ensure that your mobile device needs a complete security solution sooner than later.

THE ENEMY IS US… despite 24*7 reliance on mobile phone we don’t seem to get any smarter.

Experts agree that malware and mobile attacks will keep on increasing as more and more people keep packing their phones with rich

and sensitive data.

Conclusion

THE ENEMY IS US… despite 24*7reliance on mobile phone we don’tseem to get any smarter.Experts agree that malware andmobile attacks will keep onincreasing as more and more peoplekeep packing their phones with richand sensitive data.

Official Blog Link -https://mobileappninjas.wordpress.com/2016/03/15/top-

mobile-security-threats/

Mail us at: sales@algoworks.comContact us at: +1-877-284-1028

THANK YOU