SlideShare ist ein Scribd-Unternehmen logo
1 von 50
Mobile Applications &
Security
Ligia Adam, Security Evangelist
ladam@bitdefender.com
@LigiaAdam



Copyright@bitdefender 2012 / www.bitdefender.com
mobile devices are on the rise


         •      at the end of 2011, there were 6 billion mobile subscriptions




         •      there are now 1.2 billion mobile Web users worldwide

                  -      aka ~17% of the global population uses a smartphone




         •       and over 491.4 million smartphones were sold worldwide in 2011




Copyright@bitdefender 2012 / www.bitdefender.com                                  7/9/2012 • 2
global use of mobile browsing




Copyright@bitdefender 2012 / www.bitdefender.com   7/9/2012 • 3
what’s mobile used for (now)


         Most popular mobile destinations are news and information, weather

                reports, social networking, search and maps.




                  -      mobile browsers for banking, travel, shopping, local

                         info, news, video, sports and blogs

                  -      apps for games, social media, maps and music




Copyright@bitdefender 2012 / www.bitdefender.com                                7/9/2012 • 4
mobile environment status

         •      there are more than 400,000 Android apps on Google Play

         •      iPhone & iPad users get to choose between over 650,000 iOS Apps




         •      Apps usage

                  •      nearly 2 in 3 smartphone users use apps daily

                  •      App users had an average of 12 apps on their devices

                  •      mobile app downloads should jump to ~50 billion in 2012




Copyright@bitdefender 2012 / www.bitdefender.com                                   7/9/2012 • 5
the need for mobile security
         •      Mobile malware attacks are up 155 percent across ALL platforms
                in the last year, according to Juniper

                  •      The most vulnerable platform is Android, where malware
                         increased by more than 4500% in a year (!)

                  •      iPhones and iPads are very vulnerable to jailbreaking
                         services that infect the device during the rooting process and
                         just as vulnerable to web browsing attacks as any other device
                           • There are HUGE privacy issues with iOS apps (according
                              to Clueful stats)

                  •      attacks to Blackberry and Symbian platforms also doubled
                         since last year



Copyright@bitdefender 2012 / www.bitdefender.com                                          7/9/2012 • 6
Mobile Phising

•     phishing (criminals attempt to trick users into sharing passwords etc)




Copyright@bitdefender 2012 / www.bitdefender.com                               7/9/2012 • 7
Tips to Avoid Becoming a Mobile Banking Phishing Victim

                - Before you click on a link, make sure it is legitimate.

                - Remember that e-banking can be risky, especially when
                using a mobile device

                - Always keep your mobile device operating system and
                antivirus solution updated.




Copyright@bitdefender 2012 / www.bitdefender.com                            7/9/2012 • 8
Trojans for mobile




Copyright@bitdefender 2012 / www.bitdefender.com   7/9/2012 • 9
SndApps Trojan




Copyright@bitdefender 2012 / www.bitdefender.com   7/9/2012 • 10
Mobile Spyware



         • tracks user’s activity, sending the phone’s
           location, IMEI, phone number, address book to
           advertisers etc

         • 61% of the malware detected on phones is spyware

         • it does not affect the phone’s functionality




Copyright@bitdefender 2012 / www.bitdefender.com              7/9/2012 • 11
the dark side of the mobile world
         Other threats for mobile users are:

         •      worms (a program that copies itself onto multiple devices via
                network connections),
         •      man-in-the-middle attacks (where a criminal intercepts and
                manipulates messages between two devices or device and
                computer)
         •      Slavery - phones can even be used by part of a botnet (this is a
                network of infected ‘slave’ devices used for malicious purposes).
         •      Spam / excessive advertising / privacy breaches
         •      losing the device




Copyright@bitdefender 2012 / www.bitdefender.com                                    7/9/2012 • 12
types of mobile app risks

         Malicious Functionality

         • Activity monitoring and data retrieval (e.g: Secret SMS
           Replicator for Android)
         • Unauthorized dialing, SMS and payments (Fake Player)
         • Unauthorized network connectivity
         • UI Impersonation
         • System modification (modifying the device proxy
           configuration or APN (Access Point Name).
         • Logic or Time bomb




Copyright@bitdefender 2012 / www.bitdefender.com                     7/9/2012 • 13
types of mobile app risks / II



         App Vulnerabilities

         •      Sensitive data leakage (inadvertent or side channel)
         •      Unsafe sensitive data storage
         •      Unsafe sensitive data transmission
         •      Hardcoded password/keys




Copyright@bitdefender 2012 / www.bitdefender.com                       7/9/2012 • 14
how to get to mobile hell



         • direct download, SMS, MMS, e-mail and Bluetooth.



         • via device rooting



         • Not paying enough attention to your mobile




Copyright@bitdefender 2012 / www.bitdefender.com              7/9/2012 • 15
Q1 mobile malware landscape / I

         • the most frequent e-threats identified by Bitdefender in
           the mobile malware landscape for Q1 2012 are related to:
            - data theft and
            - malware strains related to device rooting via
               operating system exploits

         • data privacy is the number one targeted area
            - re-packaged applications bundled with malware
              and     delivered     through  alternative Android
              Marketplaces have proven an effective means of
              distributing malicious apps


Copyright@bitdefender 2012 / www.bitdefender.com                      7/9/2012 • 16
Q1 mobile malware landscape / II
         •      China, Russia and France have the highest count of smartphone
                users affected by malware.
                 - These numbers reflect an increase in pirated applications re-
                    packed with malicious code


                                            29.92%                                    29.49%           China
                                                                                                       United States
                                                                                                       Spain
                                                                                                       United Kingdom
                                                                                                       Romania
                                                                                               6.68%   Germany

                                           4.40%                                                       India
                                                                                     5.84%             France
                           1.74%                     4.47%
                              3.03%                          4.51%           5.06%                     Russian Federation
                                                                     4.87%
                                                                                                       Belgium
                                                                                                       Other




Copyright@bitdefender 2012 / www.bitdefender.com                                                                   7/9/2012 • 17
Latest trends in Android malware
         •      Crafty adware, followed by Fake Battery Doctor and Exploit
                malware (rooted devices)
         •      SMS senders (7th place) and Hack Tools will send users fake
                notification updates and lure your social media credentials




Copyright@bitdefender 2012 / www.bitdefender.com                              7/9/2012 • 18
Top Android malware in US



                                                                                               Android.Adware.Mulad.A
                                                                                      42.68%   Android.Adware.Ropin.B
                                                                                               Android.Adware.Wallap.A
            50.07%
                                                                                               Android.Exploit.Asroot.A
                                                                                               Android.Exploit.Asroot.B
                                                                                               Android.Exploit.Exploid.A
                                                                                               Android.Exploit.Exploid.B
                                                                                               Android.Exploit.Exploid.C
                                                                                               Android.Exploit.Exploid.D
                                                                      4.04%
                                                                                               Android.Exploit.GingerBreak.A
                                                                                               Other



                                                                              0.14%
                                                                     0.42%
                                                     0.84%
                                                             0.98%   0.14%

                                                   0.14%
                                                                     0.28%
                                                   0.28%



Copyright@bitdefender 2012 / www.bitdefender.com                                                               7/9/2012 • 19
Top Android malware in DE
                                                            0.08%
                                                                    1.07%   0.38%           0.54%
                                                                            0.15%
                                                   12.88%                           0.15%

                                                                               0.46%
                                                                                       0.08%

                                                                                    0.23%           Android.Adware.Mulad.A
                                                                                                    Android.Adware.Ropin.B
                                                                                                    Android.Adware.Wallap.A
                                                                                                    Android.Exploit.Asroot.A
                                                                                                    Android.Exploit.Asroot.B
                                                                                                    Android.Exploit.Asroot.D
                                                                                                    Android.Exploit.Exploid.A
                                                                                                    Android.Exploit.Exploid.B
                                                                                                    Android.Exploit.Exploid.C
                                  83.97%
                                                                                                    Android.Exploit.Exploid.D
                                                                                                    Other




Copyright@bitdefender 2012 / www.bitdefender.com                                                            7/9/2012 • 20
Top Android malware in UK                                                            0.91%

                                                                   0.20%               0.20%
                                                           0.40%
                                                                    0.20%
                                                                    0.30%
                                                                   0.20%     0.61%
                                                   8.60%
                                                                            0.10%



                                                                                               Android.Adware.Mulad.A
                                                                                               Android.Adware.Wallap.A
                                                                                               Android.Exploit.Asroot.A
                                                                                               Android.Exploit.Asroot.B
                                                                                               Android.Exploit.Asroot.D
                                                                                               Android.Exploit.Exploid.A
                                                                                               Android.Exploit.Exploid.B
                                                                                               Android.Exploit.Exploid.E
                                                                                               Android.Exploit.GingerBreak.A
                                          88.26%
                                                                                               Android.Exploit.GingerBreak.C
                                                                                               Other




Copyright@bitdefender 2012 / www.bitdefender.com                                                           7/9/2012 • 21
mobile security predictions
it will get worse, before it gets better, on all levels of mobile security:
         • software
            - We estimate a 6000% increase in Android malware samples (including
      variants) within the next 6 months
            - from 153 malware families and ~10 000 malicious apps in 2011 to over
      3*10 000 malicious apps by the end of the year
            - an increase of fake battery apps being actually malware.
            - At the moment, ~80% od malicious apps steal data and ~20% overcarge
      the user. By the end of 2012, 90% of apps will focus on stealing data

         •      privacy
                 - We estimate HUGE app privacy issues on ALL platforms
                      - detecting various apparently innocent apps that leak your data or
                         which apps ask for extra permissions they don’t actually need
         •      hardware
                 - anti-theft / anti-loss security solutions


Copyright@bitdefender 2012 / www.bitdefender.com                                            7/9/2012 • 22
May 2012



Copyright@Bitdefender 2011 / www.Bitdefender.com   7/9/2012 • 23
Bitdefender Mobile Security




Copyright@bitdefender 2012 / www.bitdefender.com   7/9/2012 • 24
Copyright@bitdefender 2012 / www.bitdefender.com   7/9/2012 • 25
Copyright@bitdefender 2012 / www.bitdefender.com   7/9/2012 • 26
BITDEFENDER MOBILE SECURITY LOVE



            Bitdefender Mobile Security is practically unnoticeable on your Android device and very easy
            to use. – PC Mag

            Bitdefender Mobile Security has the advantage of low system resource occupancy while
            protecting the mobile device - PCSL Test




Copyright@bitdefender 2012 / www.bitdefender.com                                                   7/9/2012 • 27
Detailed Features




Copyright@bitdefender 2012 / www.bitdefender.com   7/9/2012 • 28
How it looks like




Copyright@Bitdefender 2011 / www.Bitdefender.com   7/9/2012 • 29
Anti-Theft in MyBitdefender




Copyright@Bitdefender 2011 / www.Bitdefender.com   7/9/2012 • 30
Copyright@bitdefender 2012 / www.bitdefender.com   7/9/2012 • 31
Copyright@bitdefender 2012 / www.bitdefender.com   7/9/2012 • 32
POWER TUNE-UP IN ONE SLIDE


Bitdefender Power Tune-Up brings back control in your
hands. Optimize your Android device for maximum
performance, battery economy and controlled data traffic.



Saves up battery
Informs you on the remaining time
(for standby, talking, navigating)



Keeps you from reaching data traffic
limits (3G, thresholds and notifications)

Quickly frees up space
(internal memory, internal and external SD card)




Copyright@bitdefender 2012 / www.bitdefender.com            7/9/2012 • 33
THE BATTERY SAVER




Save up precious battery life by
switching to the predefined
Battery Saver or create your own
custom profile.



You have access to running apps
(you can identify the CPU and
RAM levels) and essential battery
eating options that you can turn on
or off.




Copyright@bitdefender 2012 / www.bitdefender.com   7/9/2012 • 34
THE BATTERY WIDGET




With the Power Tune-Up
widget you can keep an
eye on your remaining
battery time.




Copyright@bitdefender 2012 / www.bitdefender.com   7/9/2012 • 35
THE DATA METER - 3G DATA TRAFFIC COUNTER




It’s easy to browse away and forget
you have a limited data plan.

Set up a usage cap and Data
meter will notify you before it’s
reached.




Copyright@bitdefender 2012 / www.bitdefender.com   7/9/2012 • 36
THE CLEAN-UP MODULE




Running out of space?

With Clean-Up you can remove
temporary files, delete downloaded
files or uninstall unwanted
applications to save space.




 Copyright@bitdefender 2012 / www.bitdefender.com   7/9/2012 • 37
1. CPU used %
          Power Tune-Up: 0.093
          System Panel, System Tuner Lite: 0.11
          Mobile Utilities Task Killer (Norton): 0.14

          2. RAM (in MB)
          Android Assistant: 5.61
          System Tuner Lite: 5.69
          Power Tune-Up: 6.09
          System panel: 6.37

          3. RAM (in MB) – Android Assistant
                                                                #1
          Power Tune-Up: 3.37                           We ran our own benchmarks
          System Panel Lite: 3.49
          Android Assistant: 3.56                       and we’re beating the
          Mobile Utilities Task Killer (Norton): 3.58   competition in three out of
          4. Android Battery %                          five performance tests
          Power Tune-Up: 0.37
          System Panel: 0.54
          System Tuner Lite: 0.65
          Mobile Utilities Task Killer (Norton): 0.77

          5. Space occupied (MB)
          System Panel Lite: 1.03
          Free Advanced Task Manager: 1.37
          Android Assistant: 2.01
          Power Tune-Up: 2.02

          Tested on:
          -    Acer Iconia A500(android 3.2)
          -    HTC HD2(android 4.0)
          -    Samsung Galaxy Nexus(android 4.0.2)
Copyright@bitdefender 2012 / www.bitdefender.com                                      7/9/2012 • 38
Bitdefender Power Tune-Up

                                                   Now out of BETA

                                                   • FREE
                                                   • available on Google Play (Android Market)
                                                   • in English and Portuguese

                                                   German, French, Spanish, Romanian to follow soon




Copyright@bitdefender 2012 / www.bitdefender.com                                                      7/9/2012 • 39
Copyright@bitdefender 2012 / www.bitdefender.com   7/9/2012 • 40
CLUEFUL is a world first!




Copyright@bitdefender 2012 / www.bitdefender.com                               7/9/2012 • 41
Clueful is the only way to really understand apps, how they use your data and treat your privacy.

  Clueful identifies nasty apps on your iPhone.
   It looks at what applications are currently running in memory and it retrieves audit information from
  the Clueful Cloud.

  There's no viruses on the App Store.
  Apps must pass an Apple review before acceptance on the App Store. The malicious apps are
  rejected.

  Most apps are not malicious.
  They're just careless with your data.
  Take a look under the hood. Be curious!
  Explore and analyze clues about your apps, including your favorite ones.




Copyright@bitdefender 2012 / www.bitdefender.com                                               7/9/2012 • 42
There are apps that:

          -track your location
          - drain your battery
          - can read and make use of your address book
          - track usage behavior via Flurry (or other) analytics networks
          and display ads
          - handle your credentials in a sloppy way (think unencrypted
          over the web)
          - request access to your Facebook/Twitter/Google
          credentials
          - needlessly keep GPS or audio services on
          intensively, although they don't need to, which may rapidly drain
          your phone's battery.

Copyright@bitdefender 2012 / www.bitdefender.com                       7/9/2012 • 43
How it looks like




Copyright@bitdefender 2012 / www.bitdefender.com   7/9/2012 • 44
THE CLUES




Copyright@bitdefender 2012 / www.bitdefender.com   7/9/2012 • 45
THE HOWS and WHENS



                                                   Bitdefender Clueful

                                                   • paid app
                                                   • available worldwide on the App Store




Copyright@bitdefender 2012 / www.bitdefender.com                                            7/9/2012 • 46
The Clueful App




                                                   Check it out @ wwww.cluefulapp.com


Copyright@bitdefender 2012 / www.bitdefender.com                                        7/9/2012 • 47
Thank you!




                                                   Q/A?
Ligia Adam, Security Evangelist
mail me: ladam@bitdefender.com
Follow my Tweets: @LigiaAdam




Copyright@bitdefender 2012 / www.bitdefender.com          7/9/2012 • 48
Resources
1.    http://www.bitdefender.com/news/q1-2012-e-threat-landscape-report-2457.html

2.    http://www.itu.int/ITU-D/ict/facts/2011/material/ICTFactsFigures2011.pdf
3.    http://www.itu.int/ITU-D/ict/statistics/at_glance/KeyTelecom.html
4.    http://www.slideshare.net/CMSummit/ms-internet-trends060710final
5.    http://mobithinking.com/mobile-marketing-tools/latest-mobile-stats
6.    http://thenextweb.com/mobile/2011/11/29/report-smartphones-account-for-just-27-of-all-
      mobile-phones-worldwide/
7.    http://mobithinking.com/mobile-marketing-tools/latest-mobile-stats#mobilepageviews
8.    http://www.theretailbulletin.com/news/mcommerce_quadruples_in_two_years_24-05-12/
9.    http://mobithinking.com/mobile-marketing-tools/latest-mobile-stats#usprefersmobileweb
10.   http://mobithinking.com/mobile-marketing-tools/latest-mobile-stats
11.   http://mashable.com/2010/09/14/mobile-apps-pew-survey/
12.   http://forums.juniper.net/t5/Security-Mobility-Now/Juniper-Mobile-Security-Report-2011-
      Unprecedented-Mobile-Threat/ba-p/129529
13.   http://www.veracode.com/blog/2010/12/mobile-app-top-10-list/




Copyright@bitdefender 2012 / www.bitdefender.com                                                7/9/2012 • 49
Security Issues in the Mobile Environment

Weitere ähnliche Inhalte

Was ist angesagt?

Malware detection techniques for mobile devices
Malware detection techniques for mobile devicesMalware detection techniques for mobile devices
Malware detection techniques for mobile devicesijmnct
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentK Singh
 
H1 2011 E-Threat Landscape Report
H1 2011 E-Threat Landscape ReportH1 2011 E-Threat Landscape Report
H1 2011 E-Threat Landscape ReportBitdefender
 
E-threat landscape report H1 2012
E-threat landscape report H1 2012E-threat landscape report H1 2012
E-threat landscape report H1 2012BitDefenderRo
 
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldTrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldInfinigate Group
 
Adaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBRAdaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBRijtsrd
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniquesijdpsjournal
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)AP DealFlow
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18Symantec
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of securitySejahtera Affif
 
Cscu module 02 securing operating systems
Cscu module 02 securing operating systemsCscu module 02 securing operating systems
Cscu module 02 securing operating systemsSejahtera Affif
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worriesUltraUploader
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
Sophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 WpnaSophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 Wpnadelamm2
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportContent Rules, Inc.
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCMicrosoft Asia
 

Was ist angesagt? (20)

Malware detection techniques for mobile devices
Malware detection techniques for mobile devicesMalware detection techniques for mobile devices
Malware detection techniques for mobile devices
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
 
H1 2011 E-Threat Landscape Report
H1 2011 E-Threat Landscape ReportH1 2011 E-Threat Landscape Report
H1 2011 E-Threat Landscape Report
 
E-threat landscape report H1 2012
E-threat landscape report H1 2012E-threat landscape report H1 2012
E-threat landscape report H1 2012
 
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldTrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
 
Adaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBRAdaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBR
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniques
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of security
 
Cscu module 02 securing operating systems
Cscu module 02 securing operating systemsCscu module 02 securing operating systems
Cscu module 02 securing operating systems
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worries
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Sophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 WpnaSophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 Wpna
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware Report
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
Nielsen:2011年q3全球移动互联网媒体报告
Nielsen:2011年q3全球移动互联网媒体报告Nielsen:2011年q3全球移动互联网媒体报告
Nielsen:2011年q3全球移动互联网媒体报告
 

Andere mochten auch

Mobile computing
Mobile computingMobile computing
Mobile computingamellia27
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2Santosh Satam
 
Security and ethical issues of mobile device technology
Security and ethical issues of mobile device technologySecurity and ethical issues of mobile device technology
Security and ethical issues of mobile device technologyErik R. Ranschaert, MD, PhD
 
Secondary and special good practice - innovating safely
Secondary and special good practice - innovating safelySecondary and special good practice - innovating safely
Secondary and special good practice - innovating safelyDan Bowen
 
Curriculum vitae Giuseppe Veropalumbo
Curriculum vitae Giuseppe VeropalumboCurriculum vitae Giuseppe Veropalumbo
Curriculum vitae Giuseppe VeropalumboGiuseppe Veropalumbo
 
JTELSS14 TEL around the world incl wrap up
JTELSS14 TEL around the world incl wrap upJTELSS14 TEL around the world incl wrap up
JTELSS14 TEL around the world incl wrap upTanja Kohn
 
Scripted Interface Redesign Preview
Scripted Interface Redesign PreviewScripted Interface Redesign Preview
Scripted Interface Redesign PreviewScripted.com
 
Ifla carnegie for history 17 july 2014
Ifla carnegie for history 17 july 2014Ifla carnegie for history 17 july 2014
Ifla carnegie for history 17 july 2014Mary Nassimbeni
 
Childrens views on disability in books
Childrens views on disability in booksChildrens views on disability in books
Childrens views on disability in booksstricolo
 
туберкулез 2013
туберкулез 2013туберкулез 2013
туберкулез 2013sk1ll
 
Opnext TRF5926ANLB2U1
Opnext TRF5926ANLB2U1Opnext TRF5926ANLB2U1
Opnext TRF5926ANLB2U1savomir
 
2a Lei- A Lei da Dádiva
2a Lei- A Lei da Dádiva2a Lei- A Lei da Dádiva
2a Lei- A Lei da DádivaEduardo Cesar
 

Andere mochten auch (18)

Mobile computing
Mobile computingMobile computing
Mobile computing
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
Security and ethical issues of mobile device technology
Security and ethical issues of mobile device technologySecurity and ethical issues of mobile device technology
Security and ethical issues of mobile device technology
 
Virksomhetssøk for prosjekt - Comperio
Virksomhetssøk for prosjekt  - ComperioVirksomhetssøk for prosjekt  - Comperio
Virksomhetssøk for prosjekt - Comperio
 
Secondary and special good practice - innovating safely
Secondary and special good practice - innovating safelySecondary and special good practice - innovating safely
Secondary and special good practice - innovating safely
 
Curriculum vitae Giuseppe Veropalumbo
Curriculum vitae Giuseppe VeropalumboCurriculum vitae Giuseppe Veropalumbo
Curriculum vitae Giuseppe Veropalumbo
 
JTELSS14 TEL around the world incl wrap up
JTELSS14 TEL around the world incl wrap upJTELSS14 TEL around the world incl wrap up
JTELSS14 TEL around the world incl wrap up
 
Scripted Interface Redesign Preview
Scripted Interface Redesign PreviewScripted Interface Redesign Preview
Scripted Interface Redesign Preview
 
Oxford University Hospital
Oxford University HospitalOxford University Hospital
Oxford University Hospital
 
Guia didactica las tic
Guia didactica las ticGuia didactica las tic
Guia didactica las tic
 
NAS TS-453mini Presentation
NAS TS-453mini PresentationNAS TS-453mini Presentation
NAS TS-453mini Presentation
 
Ifla carnegie for history 17 july 2014
Ifla carnegie for history 17 july 2014Ifla carnegie for history 17 july 2014
Ifla carnegie for history 17 july 2014
 
Valore Cultura
Valore CulturaValore Cultura
Valore Cultura
 
doshkolenok
 doshkolenok doshkolenok
doshkolenok
 
Childrens views on disability in books
Childrens views on disability in booksChildrens views on disability in books
Childrens views on disability in books
 
туберкулез 2013
туберкулез 2013туберкулез 2013
туберкулез 2013
 
Opnext TRF5926ANLB2U1
Opnext TRF5926ANLB2U1Opnext TRF5926ANLB2U1
Opnext TRF5926ANLB2U1
 
2a Lei- A Lei da Dádiva
2a Lei- A Lei da Dádiva2a Lei- A Lei da Dádiva
2a Lei- A Lei da Dádiva
 

Ähnlich wie Security Issues in the Mobile Environment

APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiAPPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiMasha Geller
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
Malware Improvements in Android OS
Malware Improvements in Android OSMalware Improvements in Android OS
Malware Improvements in Android OSPranav Saini
 
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesrebelreg
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats ReportJuniper Networks
 
Top mobile security threats
Top mobile security threatsTop mobile security threats
Top mobile security threatsRingtoIndia
 
A Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile MalwareA Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile MalwareIRJET Journal
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...AM Publications
 
When Malware Goes Mobile
When Malware Goes MobileWhen Malware Goes Mobile
When Malware Goes MobileSophos
 
BYOD - Secure the data, not the device
BYOD - Secure the data, not the deviceBYOD - Secure the data, not the device
BYOD - Secure the data, not the deviceb coatesworth
 
A Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection TechniquesA Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection TechniquesCSCJournals
 
Pro global symposium
Pro global symposiumPro global symposium
Pro global symposiumAmanda Cole
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and ThreatsIRJET Journal
 
Android forensics
Android forensicsAndroid forensics
Android forensicsInfosys
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecuritySubho Halder
 
White Paper - Android Security
White Paper - Android SecurityWhite Paper - Android Security
White Paper - Android Securityryanfarmer
 
Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3princescorpio
 

Ähnlich wie Security Issues in the Mobile Environment (20)

APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiAPPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Malware Improvements in Android OS
Malware Improvements in Android OSMalware Improvements in Android OS
Malware Improvements in Android OS
 
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devices
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
 
Top mobile security threats
Top mobile security threatsTop mobile security threats
Top mobile security threats
 
A Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile MalwareA Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile Malware
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
 
When Malware Goes Mobile
When Malware Goes MobileWhen Malware Goes Mobile
When Malware Goes Mobile
 
BYOD - Secure the data, not the device
BYOD - Secure the data, not the deviceBYOD - Secure the data, not the device
BYOD - Secure the data, not the device
 
A Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection TechniquesA Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection Techniques
 
Pro global symposium
Pro global symposiumPro global symposium
Pro global symposium
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
Android forensics
Android forensicsAndroid forensics
Android forensics
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
White Paper - Android Security
White Paper - Android SecurityWhite Paper - Android Security
White Paper - Android Security
 
Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3
 

Kürzlich hochgeladen

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 

Kürzlich hochgeladen (20)

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 

Security Issues in the Mobile Environment

  • 1. Mobile Applications & Security Ligia Adam, Security Evangelist ladam@bitdefender.com @LigiaAdam Copyright@bitdefender 2012 / www.bitdefender.com
  • 2. mobile devices are on the rise • at the end of 2011, there were 6 billion mobile subscriptions • there are now 1.2 billion mobile Web users worldwide - aka ~17% of the global population uses a smartphone • and over 491.4 million smartphones were sold worldwide in 2011 Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 2
  • 3. global use of mobile browsing Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 3
  • 4. what’s mobile used for (now) Most popular mobile destinations are news and information, weather reports, social networking, search and maps. - mobile browsers for banking, travel, shopping, local info, news, video, sports and blogs - apps for games, social media, maps and music Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 4
  • 5. mobile environment status • there are more than 400,000 Android apps on Google Play • iPhone & iPad users get to choose between over 650,000 iOS Apps • Apps usage • nearly 2 in 3 smartphone users use apps daily • App users had an average of 12 apps on their devices • mobile app downloads should jump to ~50 billion in 2012 Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 5
  • 6. the need for mobile security • Mobile malware attacks are up 155 percent across ALL platforms in the last year, according to Juniper • The most vulnerable platform is Android, where malware increased by more than 4500% in a year (!) • iPhones and iPads are very vulnerable to jailbreaking services that infect the device during the rooting process and just as vulnerable to web browsing attacks as any other device • There are HUGE privacy issues with iOS apps (according to Clueful stats) • attacks to Blackberry and Symbian platforms also doubled since last year Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 6
  • 7. Mobile Phising • phishing (criminals attempt to trick users into sharing passwords etc) Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 7
  • 8. Tips to Avoid Becoming a Mobile Banking Phishing Victim - Before you click on a link, make sure it is legitimate. - Remember that e-banking can be risky, especially when using a mobile device - Always keep your mobile device operating system and antivirus solution updated. Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 8
  • 9. Trojans for mobile Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 9
  • 10. SndApps Trojan Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 10
  • 11. Mobile Spyware • tracks user’s activity, sending the phone’s location, IMEI, phone number, address book to advertisers etc • 61% of the malware detected on phones is spyware • it does not affect the phone’s functionality Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 11
  • 12. the dark side of the mobile world Other threats for mobile users are: • worms (a program that copies itself onto multiple devices via network connections), • man-in-the-middle attacks (where a criminal intercepts and manipulates messages between two devices or device and computer) • Slavery - phones can even be used by part of a botnet (this is a network of infected ‘slave’ devices used for malicious purposes). • Spam / excessive advertising / privacy breaches • losing the device Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 12
  • 13. types of mobile app risks Malicious Functionality • Activity monitoring and data retrieval (e.g: Secret SMS Replicator for Android) • Unauthorized dialing, SMS and payments (Fake Player) • Unauthorized network connectivity • UI Impersonation • System modification (modifying the device proxy configuration or APN (Access Point Name). • Logic or Time bomb Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 13
  • 14. types of mobile app risks / II App Vulnerabilities • Sensitive data leakage (inadvertent or side channel) • Unsafe sensitive data storage • Unsafe sensitive data transmission • Hardcoded password/keys Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 14
  • 15. how to get to mobile hell • direct download, SMS, MMS, e-mail and Bluetooth. • via device rooting • Not paying enough attention to your mobile Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 15
  • 16. Q1 mobile malware landscape / I • the most frequent e-threats identified by Bitdefender in the mobile malware landscape for Q1 2012 are related to: - data theft and - malware strains related to device rooting via operating system exploits • data privacy is the number one targeted area - re-packaged applications bundled with malware and delivered through alternative Android Marketplaces have proven an effective means of distributing malicious apps Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 16
  • 17. Q1 mobile malware landscape / II • China, Russia and France have the highest count of smartphone users affected by malware. - These numbers reflect an increase in pirated applications re- packed with malicious code 29.92% 29.49% China United States Spain United Kingdom Romania 6.68% Germany 4.40% India 5.84% France 1.74% 4.47% 3.03% 4.51% 5.06% Russian Federation 4.87% Belgium Other Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 17
  • 18. Latest trends in Android malware • Crafty adware, followed by Fake Battery Doctor and Exploit malware (rooted devices) • SMS senders (7th place) and Hack Tools will send users fake notification updates and lure your social media credentials Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 18
  • 19. Top Android malware in US Android.Adware.Mulad.A 42.68% Android.Adware.Ropin.B Android.Adware.Wallap.A 50.07% Android.Exploit.Asroot.A Android.Exploit.Asroot.B Android.Exploit.Exploid.A Android.Exploit.Exploid.B Android.Exploit.Exploid.C Android.Exploit.Exploid.D 4.04% Android.Exploit.GingerBreak.A Other 0.14% 0.42% 0.84% 0.98% 0.14% 0.14% 0.28% 0.28% Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 19
  • 20. Top Android malware in DE 0.08% 1.07% 0.38% 0.54% 0.15% 12.88% 0.15% 0.46% 0.08% 0.23% Android.Adware.Mulad.A Android.Adware.Ropin.B Android.Adware.Wallap.A Android.Exploit.Asroot.A Android.Exploit.Asroot.B Android.Exploit.Asroot.D Android.Exploit.Exploid.A Android.Exploit.Exploid.B Android.Exploit.Exploid.C 83.97% Android.Exploit.Exploid.D Other Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 20
  • 21. Top Android malware in UK 0.91% 0.20% 0.20% 0.40% 0.20% 0.30% 0.20% 0.61% 8.60% 0.10% Android.Adware.Mulad.A Android.Adware.Wallap.A Android.Exploit.Asroot.A Android.Exploit.Asroot.B Android.Exploit.Asroot.D Android.Exploit.Exploid.A Android.Exploit.Exploid.B Android.Exploit.Exploid.E Android.Exploit.GingerBreak.A 88.26% Android.Exploit.GingerBreak.C Other Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 21
  • 22. mobile security predictions it will get worse, before it gets better, on all levels of mobile security: • software - We estimate a 6000% increase in Android malware samples (including variants) within the next 6 months - from 153 malware families and ~10 000 malicious apps in 2011 to over 3*10 000 malicious apps by the end of the year - an increase of fake battery apps being actually malware. - At the moment, ~80% od malicious apps steal data and ~20% overcarge the user. By the end of 2012, 90% of apps will focus on stealing data • privacy - We estimate HUGE app privacy issues on ALL platforms - detecting various apparently innocent apps that leak your data or which apps ask for extra permissions they don’t actually need • hardware - anti-theft / anti-loss security solutions Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 22
  • 23. May 2012 Copyright@Bitdefender 2011 / www.Bitdefender.com 7/9/2012 • 23
  • 24. Bitdefender Mobile Security Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 24
  • 25. Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 25
  • 26. Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 26
  • 27. BITDEFENDER MOBILE SECURITY LOVE Bitdefender Mobile Security is practically unnoticeable on your Android device and very easy to use. – PC Mag Bitdefender Mobile Security has the advantage of low system resource occupancy while protecting the mobile device - PCSL Test Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 27
  • 28. Detailed Features Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 28
  • 29. How it looks like Copyright@Bitdefender 2011 / www.Bitdefender.com 7/9/2012 • 29
  • 30. Anti-Theft in MyBitdefender Copyright@Bitdefender 2011 / www.Bitdefender.com 7/9/2012 • 30
  • 31. Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 31
  • 32. Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 32
  • 33. POWER TUNE-UP IN ONE SLIDE Bitdefender Power Tune-Up brings back control in your hands. Optimize your Android device for maximum performance, battery economy and controlled data traffic. Saves up battery Informs you on the remaining time (for standby, talking, navigating) Keeps you from reaching data traffic limits (3G, thresholds and notifications) Quickly frees up space (internal memory, internal and external SD card) Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 33
  • 34. THE BATTERY SAVER Save up precious battery life by switching to the predefined Battery Saver or create your own custom profile. You have access to running apps (you can identify the CPU and RAM levels) and essential battery eating options that you can turn on or off. Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 34
  • 35. THE BATTERY WIDGET With the Power Tune-Up widget you can keep an eye on your remaining battery time. Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 35
  • 36. THE DATA METER - 3G DATA TRAFFIC COUNTER It’s easy to browse away and forget you have a limited data plan. Set up a usage cap and Data meter will notify you before it’s reached. Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 36
  • 37. THE CLEAN-UP MODULE Running out of space? With Clean-Up you can remove temporary files, delete downloaded files or uninstall unwanted applications to save space. Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 37
  • 38. 1. CPU used % Power Tune-Up: 0.093 System Panel, System Tuner Lite: 0.11 Mobile Utilities Task Killer (Norton): 0.14 2. RAM (in MB) Android Assistant: 5.61 System Tuner Lite: 5.69 Power Tune-Up: 6.09 System panel: 6.37 3. RAM (in MB) – Android Assistant #1 Power Tune-Up: 3.37 We ran our own benchmarks System Panel Lite: 3.49 Android Assistant: 3.56 and we’re beating the Mobile Utilities Task Killer (Norton): 3.58 competition in three out of 4. Android Battery % five performance tests Power Tune-Up: 0.37 System Panel: 0.54 System Tuner Lite: 0.65 Mobile Utilities Task Killer (Norton): 0.77 5. Space occupied (MB) System Panel Lite: 1.03 Free Advanced Task Manager: 1.37 Android Assistant: 2.01 Power Tune-Up: 2.02 Tested on: - Acer Iconia A500(android 3.2) - HTC HD2(android 4.0) - Samsung Galaxy Nexus(android 4.0.2) Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 38
  • 39. Bitdefender Power Tune-Up Now out of BETA • FREE • available on Google Play (Android Market) • in English and Portuguese German, French, Spanish, Romanian to follow soon Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 39
  • 40. Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 40
  • 41. CLUEFUL is a world first! Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 41
  • 42. Clueful is the only way to really understand apps, how they use your data and treat your privacy. Clueful identifies nasty apps on your iPhone. It looks at what applications are currently running in memory and it retrieves audit information from the Clueful Cloud. There's no viruses on the App Store. Apps must pass an Apple review before acceptance on the App Store. The malicious apps are rejected. Most apps are not malicious. They're just careless with your data. Take a look under the hood. Be curious! Explore and analyze clues about your apps, including your favorite ones. Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 42
  • 43. There are apps that: -track your location - drain your battery - can read and make use of your address book - track usage behavior via Flurry (or other) analytics networks and display ads - handle your credentials in a sloppy way (think unencrypted over the web) - request access to your Facebook/Twitter/Google credentials - needlessly keep GPS or audio services on intensively, although they don't need to, which may rapidly drain your phone's battery. Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 43
  • 44. How it looks like Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 44
  • 45. THE CLUES Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 45
  • 46. THE HOWS and WHENS Bitdefender Clueful • paid app • available worldwide on the App Store Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 46
  • 47. The Clueful App Check it out @ wwww.cluefulapp.com Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 47
  • 48. Thank you! Q/A? Ligia Adam, Security Evangelist mail me: ladam@bitdefender.com Follow my Tweets: @LigiaAdam Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 48
  • 49. Resources 1. http://www.bitdefender.com/news/q1-2012-e-threat-landscape-report-2457.html 2. http://www.itu.int/ITU-D/ict/facts/2011/material/ICTFactsFigures2011.pdf 3. http://www.itu.int/ITU-D/ict/statistics/at_glance/KeyTelecom.html 4. http://www.slideshare.net/CMSummit/ms-internet-trends060710final 5. http://mobithinking.com/mobile-marketing-tools/latest-mobile-stats 6. http://thenextweb.com/mobile/2011/11/29/report-smartphones-account-for-just-27-of-all- mobile-phones-worldwide/ 7. http://mobithinking.com/mobile-marketing-tools/latest-mobile-stats#mobilepageviews 8. http://www.theretailbulletin.com/news/mcommerce_quadruples_in_two_years_24-05-12/ 9. http://mobithinking.com/mobile-marketing-tools/latest-mobile-stats#usprefersmobileweb 10. http://mobithinking.com/mobile-marketing-tools/latest-mobile-stats 11. http://mashable.com/2010/09/14/mobile-apps-pew-survey/ 12. http://forums.juniper.net/t5/Security-Mobility-Now/Juniper-Mobile-Security-Report-2011- Unprecedented-Mobile-Threat/ba-p/129529 13. http://www.veracode.com/blog/2010/12/mobile-app-top-10-list/ Copyright@bitdefender 2012 / www.bitdefender.com 7/9/2012 • 49

Hinweis der Redaktion

  1. Mobile devices have now replaced laptops as the soft target.- 96 percent of smartphones and tablets do not have third-party security software installed, according to Canalys and Juniper
  2. People who believe "there's nothing worth stealing on a smartphone“overlooks emails, attachments, contacts and address books and, of course, the wireless and VPN configuration that permit access to the corporate network.
  3. EG: sending each email sent on the device to a hidden 3rd party address, letting an attacker listen in on phone calls or simply open microphone recordingThe category of Vulnerabilities are errors in design or implementation that expose the mobile device data to interception and retrieval by attackers. Vulnerabilities can also expose the mobile device or the cloud applications used from the device to unauthorized access.
  4. Closely followed by “Battery Doctor” (also known as Android.Trojan.FakeDoc.A) with a 23.37% infection rate, we’re left to conclude that either awareness of this Trojan is still pretty low or people simply don’t mind having their devices pried into.Worth mentioning is a second adware (Android.Adware.Wallap.A) which, although ranked seventh in our chat, proves that adware is definitely on the rise. The downloaded file is “Update.apk” and the application is named “com.Security.Update” so that everyone will execute it when user assistance is prompted. Ranked eighth in our chart, this Trojan will probably fade out of existence unless more websites are hit by the same drive-by attacks.Your Facebook, Twitter, and LinkedIn usernames and passwords are still not safe, because Android.Hacktool.DroidSheep.A is still in our top ten malware chart. Headstrong and not going away, we still issue a warning to those in the habit of downloading bizarre and questionable apps from strange marketplaces.
  5. Demo the functionalities of Bitdefender mobile security with focus onCloud detection and speedLittle to no impact on battery performanceHigh and reliable detection rateInsight to the permissions granted to the installed applications through Security AuditAnti-Theft functionalities : Remotely Locate the device