SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
Malicious Mobile Apps

A Growing Threat in 2013 and Beyond

The workplace technology
landscape has changed
dramatically over the past
five years, and the security
threats have changed along
with it. Here are the growing
factors that IT professionals
can't afford to ignore:

More mobile devices

are accessing networks
than ever before

of SMBs

support tablets and/or smartphones
for their company

The types of mobile devices accessing networks vary

66%

54%

BYOD

Personal/guest
mobile devices

92%

83%

51%

51%

iOS

Android

BlackBerry

Windows

76%
The number
believe

of
Mobile Devices They Support

will

INCREASE
12 MONTHS

in the next

Malicious Mobile Apps (MMAs)
are reaching critical mass

2012
58%

in

mobile malware families increased
to account for

59%

of all mobile malware

What does mobile malware do?

32%

15%

steal
information

13%

track
user

8%

send
content

reconfigure
device

RESEARCH HAS FOUND THAT:
12%

of all Android apps are
truly malicious, & free
apps are a target.

79%

of the top 50 free iOS &
Android apps are associated
with risky behaviors or
privacy issues.

73%

24%

of IT pros are not notified
when a mobile device has
been rooted.

of mobile phones on
corporate networks are
jailbroken.

MMAs are also found through legitimate app stores like

IT PROS

73%
25%

of IT pros believe their security
solution is not very or not at all
effective at protecting against MMAs
of IT pros believe MMAs are
not a very big or not a threat
at all to their company

28%

?

30%

x

of IT pros are not very or not
at all familiar with MMAs

of IT pros believe there
will be more mobile
threats to their network
in the next 12 months

Find out the truth

behind MMAs and how to protect
your network from mobile app threats.
View the ATTACk of the mobile
apps webinar from webroot
www.spiceworks.com/webroot/apps

Sources: Voice of IT Survey on Malicious Mobile Apps (Spiceworks, May, 2013)
Internet Security Threat Report - 2013 (Symantec, April 2013)
February App Reputation Report – (Appthority, February 2013)
Webroot Research

View now!

Weitere ähnliche Inhalte

Mehr von Liberteks

QuestionPro for dummies
QuestionPro for dummiesQuestionPro for dummies
QuestionPro for dummiesLiberteks
 
IT Policy Compliance for Dummies
IT Policy Compliance for DummiesIT Policy Compliance for Dummies
IT Policy Compliance for DummiesLiberteks
 
Point -of-Sale Security for Dummies
Point -of-Sale Security for DummiesPoint -of-Sale Security for Dummies
Point -of-Sale Security for DummiesLiberteks
 
Midmarket Collaboration for Dummies
Midmarket Collaboration for DummiesMidmarket Collaboration for Dummies
Midmarket Collaboration for DummiesLiberteks
 
Email Signatures for Dummies
Email Signatures for DummiesEmail Signatures for Dummies
Email Signatures for DummiesLiberteks
 
Custom Publishing for Dummies
Custom Publishing for DummiesCustom Publishing for Dummies
Custom Publishing for DummiesLiberteks
 
Cloud Service for Dummies
Cloud Service for DummiesCloud Service for Dummies
Cloud Service for DummiesLiberteks
 
B2B Online Display Advertising for Dummies
B2B Online Display Advertising for DummiesB2B Online Display Advertising for Dummies
B2B Online Display Advertising for DummiesLiberteks
 
APIs for dummies
APIs for dummiesAPIs for dummies
APIs for dummiesLiberteks
 
Website Threats for Dummies
Website Threats for DummiesWebsite Threats for Dummies
Website Threats for DummiesLiberteks
 
Software-Defined WAM for Dummies
Software-Defined WAM for DummiesSoftware-Defined WAM for Dummies
Software-Defined WAM for DummiesLiberteks
 
Vulnerability Management for Dummies
Vulnerability Management for DummiesVulnerability Management for Dummies
Vulnerability Management for DummiesLiberteks
 
Integrated Marketing For Dummies
Integrated Marketing For DummiesIntegrated Marketing For Dummies
Integrated Marketing For DummiesLiberteks
 
Hyper-Converged Appliances for Dummies
Hyper-Converged Appliances for DummiesHyper-Converged Appliances for Dummies
Hyper-Converged Appliances for DummiesLiberteks
 
Flash Array Deployment for Dummies
Flash Array Deployment for DummiesFlash Array Deployment for Dummies
Flash Array Deployment for DummiesLiberteks
 
Container Storage for Dummies
Container Storage for DummiesContainer Storage for Dummies
Container Storage for DummiesLiberteks
 
Cloud Security for Dumies
Cloud Security for DumiesCloud Security for Dumies
Cloud Security for DumiesLiberteks
 
Social Recruiting for Dummies
Social Recruiting for DummiesSocial Recruiting for Dummies
Social Recruiting for DummiesLiberteks
 
Optimizing Database Storage Performance for Dummies
Optimizing Database Storage Performance for DummiesOptimizing Database Storage Performance for Dummies
Optimizing Database Storage Performance for DummiesLiberteks
 
Operational Process Transformation for Dummies
Operational Process Transformation for DummiesOperational Process Transformation for Dummies
Operational Process Transformation for DummiesLiberteks
 

Mehr von Liberteks (20)

QuestionPro for dummies
QuestionPro for dummiesQuestionPro for dummies
QuestionPro for dummies
 
IT Policy Compliance for Dummies
IT Policy Compliance for DummiesIT Policy Compliance for Dummies
IT Policy Compliance for Dummies
 
Point -of-Sale Security for Dummies
Point -of-Sale Security for DummiesPoint -of-Sale Security for Dummies
Point -of-Sale Security for Dummies
 
Midmarket Collaboration for Dummies
Midmarket Collaboration for DummiesMidmarket Collaboration for Dummies
Midmarket Collaboration for Dummies
 
Email Signatures for Dummies
Email Signatures for DummiesEmail Signatures for Dummies
Email Signatures for Dummies
 
Custom Publishing for Dummies
Custom Publishing for DummiesCustom Publishing for Dummies
Custom Publishing for Dummies
 
Cloud Service for Dummies
Cloud Service for DummiesCloud Service for Dummies
Cloud Service for Dummies
 
B2B Online Display Advertising for Dummies
B2B Online Display Advertising for DummiesB2B Online Display Advertising for Dummies
B2B Online Display Advertising for Dummies
 
APIs for dummies
APIs for dummiesAPIs for dummies
APIs for dummies
 
Website Threats for Dummies
Website Threats for DummiesWebsite Threats for Dummies
Website Threats for Dummies
 
Software-Defined WAM for Dummies
Software-Defined WAM for DummiesSoftware-Defined WAM for Dummies
Software-Defined WAM for Dummies
 
Vulnerability Management for Dummies
Vulnerability Management for DummiesVulnerability Management for Dummies
Vulnerability Management for Dummies
 
Integrated Marketing For Dummies
Integrated Marketing For DummiesIntegrated Marketing For Dummies
Integrated Marketing For Dummies
 
Hyper-Converged Appliances for Dummies
Hyper-Converged Appliances for DummiesHyper-Converged Appliances for Dummies
Hyper-Converged Appliances for Dummies
 
Flash Array Deployment for Dummies
Flash Array Deployment for DummiesFlash Array Deployment for Dummies
Flash Array Deployment for Dummies
 
Container Storage for Dummies
Container Storage for DummiesContainer Storage for Dummies
Container Storage for Dummies
 
Cloud Security for Dumies
Cloud Security for DumiesCloud Security for Dumies
Cloud Security for Dumies
 
Social Recruiting for Dummies
Social Recruiting for DummiesSocial Recruiting for Dummies
Social Recruiting for Dummies
 
Optimizing Database Storage Performance for Dummies
Optimizing Database Storage Performance for DummiesOptimizing Database Storage Performance for Dummies
Optimizing Database Storage Performance for Dummies
 
Operational Process Transformation for Dummies
Operational Process Transformation for DummiesOperational Process Transformation for Dummies
Operational Process Transformation for Dummies
 

Malicious Mobile Apps

  • 1. Malicious Mobile Apps A Growing Threat in 2013 and Beyond The workplace technology landscape has changed dramatically over the past five years, and the security threats have changed along with it. Here are the growing factors that IT professionals can't afford to ignore: More mobile devices are accessing networks than ever before of SMBs support tablets and/or smartphones for their company The types of mobile devices accessing networks vary 66% 54% BYOD Personal/guest mobile devices 92% 83% 51% 51% iOS Android BlackBerry Windows 76% The number believe of Mobile Devices They Support will INCREASE 12 MONTHS in the next Malicious Mobile Apps (MMAs) are reaching critical mass 2012 58% in mobile malware families increased to account for 59% of all mobile malware What does mobile malware do? 32% 15% steal information 13% track user 8% send content reconfigure device RESEARCH HAS FOUND THAT: 12% of all Android apps are truly malicious, & free apps are a target. 79% of the top 50 free iOS & Android apps are associated with risky behaviors or privacy issues. 73% 24% of IT pros are not notified when a mobile device has been rooted. of mobile phones on corporate networks are jailbroken. MMAs are also found through legitimate app stores like IT PROS 73% 25% of IT pros believe their security solution is not very or not at all effective at protecting against MMAs of IT pros believe MMAs are not a very big or not a threat at all to their company 28% ? 30% x of IT pros are not very or not at all familiar with MMAs of IT pros believe there will be more mobile threats to their network in the next 12 months Find out the truth behind MMAs and how to protect your network from mobile app threats. View the ATTACk of the mobile apps webinar from webroot www.spiceworks.com/webroot/apps Sources: Voice of IT Survey on Malicious Mobile Apps (Spiceworks, May, 2013) Internet Security Threat Report - 2013 (Symantec, April 2013) February App Reputation Report – (Appthority, February 2013) Webroot Research View now!