1. Mobile Security and Privacy in 3G & LTE:
Strategies, Solutions and Market Forecast
Analysis 2012-2017
URL: http://mindcommerce.com/Publications/MobileSecurityPrivacy_2012-2017.php
Published: Sep 2012 Pages: 112
Single User: $1,995.00:
Company Wide: $4,995.00:
Team License: $2,865.00
This market has been initially driven by business concerns about protection of corporate
assets and information. Mobile threats are becoming increasingly prolific as the mobile
platform continues to gain popularity through the adoption of smart devices. As end-
users and businesses come to rely on smartphones and tablets in their personal and
business activities, they store valuable information that is attracting the attention of
cybercriminals.
National mobile security markets in Europe, North America and the Asia Pacific region
will experience the strongest growth. BRIC nations will also show signs of a burgeoning
mobile security market as their populations increasingly adopt smart devices.
This research evaluates the mobile security and privacy ecosystem and vendor/solution
analysis including several case studies. It analyzes current and anticipated security and
privacy concerns and associated solutions. It identifies most likely and impactful mobile
threats and related strategies for defense. The report provides market projection
analysis on a global, regional, and country basis for 2012 through 2017.
This report also provide country-specific mobile security market analysis for Australia,
Brazil, Canada, China, France, Germany, India, Russia, UK, and USA as well as regional
analysis for the Middle East and Southeast Asia. It also includes analysis of the
following network operator initiatives in mobile security/privacy: Airtel, AT&T, MTS,
Orange, Saudi Telecom, Telefonica, T-Mobile, Verizon, and Vodafone.
Target Audience:
2. • Mobile/wireless service providers
• Mobile security and privacy vendors
• Mobile/wireless device manufacturers
• Mobile/wireless application developers
• Government and regulatory organizations
• Law enforcement including police and others
Table of Contents:
1.0 EXECUTIVE SUMMARY 9
2.0 MOBILE SECURITY THREAT AND PRIVACY MARKET OVERVIEW 10
3.0 UNDERSTANDING MOBILE SECURITY: 11
3.1 DEFINING MOBILE SECURITY: 11
3.2 MOBILE DEVICE SECURITY 11
4.0 UNDERSTANDING MOBILE THREATS 13
4.1 WEB BASED THREAT 13
4.2 PHISHING SCAMS 13
4.3 DRIVE-BY DOWNLOADS: 13
4.4 BROWSER EXPLOITS: 13
4.5 WI-FI SNIFFING 14
4.6 SOCIAL ENGINEERING ATTACKS 15
4.7 RESOURCE ABUSE 15
4.8 DATA LOSS 15
4.9 DATA INTEGRITY THREATS 16
5.0 UNDERSTANDING MOBILE PRIVACY 17
5.1 THE TYPES OF THREAT 17
5.2 THE THREAT SMARTPHONES POSE TO BUSINESSES 17
5.3 THE SOPHISTICATION OF THE MOBILE DEVICE IS IT’S OWN WORST ENEMY: 17
5.4 THE BIG PROBLEM WITH DOWNLOADABLE MOBILE APPS 17
5.5 REMOTELY HOSTED MOBILE APPLICATIONS AND DATA: 18
5.6 THE PROBLEMS WITH GSM: 18
5.7 THE GROWTH OF MACHINE TO MACHINE (M2M) 18
5.8 THE BIGGEST MYTH ABOUT MOBILE SECURITY 19
6.0 MOBILE ATTACKS AND VULNERABILITIES REVIEW 2011 20
6.1 JANUARY TO DECEMBER 2011 20
6.2 APPLE IOS VULNERABILITIES 21
6.3 DIRECT ATTACKS 21
6.4 BROWSER-BASED THREATS 22
6.5 THE BASIC STEPS TO PERFORM THIS ATTACK INCLUDE: 22
6.6 THREAT FOR SMBS (SMALL & MEDIUM BUSINESSES) 23
7.0 MOBILE SECURITY THREAT BY OS PLATFORM 24
7.1 IOS 24
3. 7.2 SUMMARY OF IOS SECURITY 24
7.3 ANDROID 25
7.4 SUMMARY OF ANDROID’S SECURITY 26
8.0 MOBILE MALWARE FOR DEVICES 28
9.0 MOBILE DEVICE SECURITY: ANTIVIRUS SOFTWARE 30
9.1 AVG MOBILE SECURITY 30
9.2 KASPERSKY MOBILE SECURITY 30
9.3 ESET MOBILE SECURITY 31
9.4 BULLGUARD MOBILE SECURITY 31
9.5 MCAFEE MOBILE SECURITY 31
9.6 LOOKOUT MOBILE SECURITY 32
9.7 F-SECURE MOBILE SECURITY 32
9.8 NORTON SMARTPHONE SECURITY 32
9.9 TREND MICRO MOBILE SECURITY 32
9.10 DR. WEB MOBILE SECURITY SUITE 33
10.0 MOBILE SECURITY TREND ANALYSIS 34
10.1 NETWORK SECURITY TREND 34
10.1.1 RANSOMWARE TO TAKE MOBILE DEVICES HOSTAGE 34
10.1.2 WORMING INTO ANDROID 34
10.1.3 POLYMORPHISM WANT A CRACKER? 34
10.1.4 CLAMPDOWN ON NETWORK-BASED MONEY LAUNDERING 35
10.1.5 PUBLIC-PRIVATE RELATIONSHIPS IN SECURITY 35
10.1.6 SCADA UNDER THE SCOPE 35
10.1.7 SPONSORED ATTACKS 36
10.1.8 HACKING A GOOD CAUSE 36
10.2 MOBILE VIRTUAL PRIVATE NETWORK TREND 37
10.3 CLOUD BASE SECURITY: 38
10.4 CASE ANALYSIS: OBLIVIOUS DATA LOSS AND THE WILD WEST OF MOBILE APP
SECURITY 39
10.4.1 IN A WORST CASE SCENARIO, THEN, EXACTLY WHAT ARE THE RISKS OF
OBLIVIOUS DATA LOSS? 40
11.0 TOP SECURITY THREAT TREND IN 2012 42
11.1 SOCIAL MEDIA AND THE WEB: 42
11.2 SECURITY MEANS MORE THAN MICROSOFT: 42
11.3 MOBILE DEVICES IN THE SPOTLIGHT 42
11.4 NEW WEB AND NETWORK TECHNOLOGIES 42
11.5 CASUAL CONSUMERIZATION CAUSES BACKSLIDING 42
11.6 MORE HACKTIVISM AND TARGETED ATTACKS 42
11.7 DATA REGULATIONS PROLIFERATE AND PENALTIES GROW 42
11.8 MOBILE PAYMENT TECHNOLOGY MAY BE NEW TARGET 43
11.9 CLOUD SERVICES ARE BACK IN VOGUE 43
4. 11.10 THE BASICS STILL GO WRONG 43
12.0 GROWTH DRIVER ON TODAY’S MOBILE SECURITY & PRIVACY LANDSCAPE 44
12.1 PROLIFERATION OF SMARTPHONE & INTELLIGENT MOBILE COMPUTING DEVICES
44
12.2 INCREASING DEMAND OF DATA SERVICES 45
12.3 GROWING DEMAND ON USING OF CORPORATE AND OPEN NETWORKS 46
12.4 DEVELOPMENT OF MCOMMERCE 46
12.5 MOBILE ENTERTAINMENT PROLIFERATION 47
12.6 MOBILE PERSONALIZATION DEMAND AND MSECURITY 47
12.7 GROWTH OF OPEN SOURCE OS LIKE ANDROID 47
13.0 MOBILE SECURITY MARKET PROJECTION 2012-2017: GLOBAL VS. REGIONAL VS.
NATIONAL 49
13.1 GLOBAL MARKET VALUE ON SPENDING 2012-2017 49
13.2 MARKET VALUE SHARE ACROSS ECO-SYSTEM 2012-2017 49
13.3 REGIONAL MARKET VALUE SHARE IN % VS. MOBILE SUBSCRIBER % (APAC VS.
EUROPE VS. NORTH AMERICA VS. LATIN AMERICA VS. AFRICA) 51
13.4 REGIONAL MARKET VALUE IN USD MLN: APAC VS. EUROPE VS. NORTH AMERICA
VS. LATIN AMERICA VS. AFRICA 2012-2017 52
13.5 CAGR COMPARISON OF 2012 TO 2017(APAC VS. EUROPE VS. NORTH AMERICA
VS. LATIN AMERICA VS. AFRICA) 52
13.6 NATIONAL MARKET VALUE PROJECTION OF TOP 13 COUNTRIES/TERRITORIES
2012-2017 53
13.7 SECURITY SOFTWARE PRE-INSTALLED PROJECTION AMONG TOTAL
SMARTPHONES & TABLETS 2012-2017 53
13.8 UP-TO-DATE SECURITY SOFTWARE USE BEHAVIOR AMONG MOBILE DEVICE
OWNER: % OF INSTALLED VS. NOT INSTALLED 2012-2017 54
13.9 MOBILE RELATED CYBER CRIME VICTIM VS. UNAWARE ABOUT MOBILE SECURITY
MEASURE: % AMONG MOBILE DEVICE OWNER 54
13.10 MOBILE OS RANKING AS PER DEVICE SECURITY 55
13.10.1 WHICH MOBILE OS CAN ENSURE HIGHEST SECURITY? 57
13.11 MOBILE SECURITY COMPANY MERGER & ACQUISITION TREND 2011-2012 58
13.12 INVESTMENT TREND AND OPTION IN MOBILE SECURITY BUSINESS 58
14.0 COUNTRY SPECIFIC MOBILE SECURITY MARKET ANALYSIS 59
14.1 CHINA 59
14.1.1 MOBILE SECURITY MARKET SHARE 2012 59
14.1.2 TOTAL MOBILE SECURITY PRODUCT USER VS. ACTIVE USER 2012 59
14.1.3 SYMBIAN VS. ANDROID: NEW VIRUS NUMBER 2010-2012 Q1 60
14.1.4 SYMBIAN VS. ANDROID: TYPES OF VIRUS 2012 60
14.1.5 MOBILE INTERNET USER PROJECTION 2012-2017 61
14.2 USA 61
14.2.1 MOBILE INTERNET USER 2012-2017 61
5. 14.2.2 % OF MOBILE ANTIVIRUS SOFTWARE USER AMONG TOTAL MOBILE INTERNET
USER 62
14.2.3 BOTNET ON SPREADING VIRUS 2012 62
14.2.4 PLATFORM USE TO SPREAD SPAM ON MOBILE DEVICE 63
14.3 UK 63
14.3.1 MOBILE INTERNET USER 2012 – 2017 63
14.3.2 MOBILE ANTIVIRUS SOFTWARE 2012 64
14.3.3 BOTNET ON SPREADING VIRUS 64
14.4 RUSSIA 65
14.4.1 MOBILE INTERNET USER 65
14.4.2 MOBILE ANTIVIRUS SOFTWARE USER 2012 65
14.4.3 COMMON TYPES OF SPAM 2012 66
14.5 FRANCE 66
14.5.1 MOBILE INTERNET USER 66
14.5.2 MOBILE ANTIVIRUS SOFTWARE 2012 67
14.5.3 COMMON TYPES OF SPAM 2012 67
14.6 BRAZIL: 68
14.6.1 MOBILE INTERNET USER 68
14.6.2 MOBILE ANTIVIRUS SOFTWARE: 68
14.6.3 PLATFORM USE TO SPREAD SPAM ON MOBILE DEVICE 69
14.7 INDIA 69
14.7.1 MOBILE INTERNET USER 69
14.7.2 MOBILE ANTIVIRUS SOFTWARE 2012 70
14.7.3 COMMON SPAM TYPES IN INDIA 70
14.8 GERMANY 71
14.8.1 MOBILE INTERNET USER 71
14.8.2 MOBILE ANTIVIRUS SOFTWARE 71
14.8.3 PLATFORM USE TO SPREAD SPAM ON MOBILE DEVICE 72
14.9 AUSTRALIA 72
14.9.1 MOBILE INTERNET USER 72
14.9.2 MOBILE ANTIVIRUS SOFTWARE 2012 73
14.10 MIDDLE EAST 73
14.10.1 MOBILE INTERNET USER 73
14.10.2 MOBILE ANTIVIRUS SOFTWARE 2012 74
14.11 SOUTH EAST ASIA 74
14.11.1 MOBILE INTERNET USER 74
14.11.2 MOBILE ANTIVIRUS SOFTWARE 2012 75
14.12 CANADA 75
14.12.1 MOBILE INTERNET USER 75
14.12.2 MOBILE ANTIVIRUS SOFTWARE 2012 76
15.0 MOBILE SECURITY VENDOR / SOLUTION PROVIDER ANALYSIS 77
6. 15.1 VENDOR INVESTMENT INITIATIVE 2012 77
15.1.1 LOOKOUT MOBILE 77
15.1.2 SYMANTEC 77
15.1.3 MCAFEE 77
15.1.4 JUNIPER NETWORKS 77
15.1.5 CISCO 77
15.1.6 TREND MICRO 77
15.2 AVAST REVIEW 78
15.3 WORLDWIDE ANTIVIRUS SOFTWARE MARKET ANALYSIS 80
16.0 SMARTPHONE SECURITY VULNERABILITY 82
17.0 MOBILE SECURITY MERGERS AND ACQUISITIONS (M&A). 83
18.0 MOBILE HANDSET / OS PROVIDER INITIATIVE ANALYSIS 84
19.0 TELECOM NETWORK PROVIDER INITIATIVE ANALYSIS 86
19.1 AT&T 86
19.2 VODAFONE 86
19.3 T-MOBILE 86
19.4 ORANGE 86
19.5 SAUDI TELECOM 87
19.6 VERIZON 87
19.7 TELEFONICA 87
19.8 AIRTEL 87
19.9 MTS 88
20.0 MOBILE THREAT LANDSCAPE REVIEW JAN-JULY 2012 89
20.1 LATEST THREATS BY TYPE 2012 (JAN – JULY) 89
20.2 NEW VARIANTS OF ALREADY KNOWN FAMILIES 89
21.0 MOBILE PRIVACY LANDSCAPE REVIEW: DO-NOT-TRACK DEBATE 90
22.0 MOBILE SECURITY CASE ANALYSIS 91
22.1 A SYMANTEC CASE: MOBILE HACKERS IN THE VALUE CHAIN 91
22.2 A TROJAN CASE: THE RISE OF MOBILE THREATS WITH POLITICAL AGENDAS 94
22.3 BRITISH ROYAL MOBILE PHONE HACKING CASE 98
22.3.1 CAN IT BE STOPPED? 99
23.0 MOBILE PRIVACY CASE ANALYSIS 101
23.1 PANDALABS PRIVACY VIOLATION PREDICTION CASE – THE BIGGEST SECURITY
THREAT OF 2012 102
23.1.1 MOBILE MALWARE 103
23.1.2 MALWARE FOR TABLETS 103
23.1.3 MAC MALWARE 103
23.1.4 PC MALWARE 103
23.1.5 SMBS UNDER ATTACK 104
23.1.6 WINDOWS 8 104
23.2 MOBILE PRIVACY THREAT CASE TO TRAVEL STORES 104
7. 23.2.1 HEALTHCARE MOBILE DATA LOSS CASE STUDY 105
24.0 CONCLUSION & RECOMMENDATIONS: 106
24.1 CONCLUSION 106
24.2 RECOMMENDED 10 BEST PROTECTION PRACTICES AGAINST MOBILE THREAT 107
24.3 RECOMMENDED PROTECTION AGAINST MOBILE PRIVACY VIOLATION 109
24.3.1 MOBILE ANTIVIRUS 109
24.3.2 SECURE BROWSER 109
24.3.3 MOBILE DEVICE MANAGEMENT (MDM) 110
24.3.4 ENTERPRISE SANDBOX 110
24.3.5 DATA LOSS PREVENTION (DLP) 111
24.3.6 DEVICE SECURITY MODELS 111
List of Figures
Figure 1: Mobile device threat Diagram 12
Figure 2: % of Web Based Threat 13
Figure 3: User’s email account on an Apple iPad exploited by the Firesheep tool
(copyright: Yahoo) 14
Figure 4: Diagram of Protection against Mobile to Mobile threat 16
Figure 5: Mobile malware in multipurpose 29
Figure 6: Mobile Overtaking Web (copyright: Morgan Stanley) 45
Figure 7: Global Mobile Data Traffic Forecast by Region (copyright: Cisco) 45
Figure 8: Growth of Mobile commerce 46
Figure 9: growth of android market share 48
Figure 10: Global mSecurity Market Value on Spending 2012-2017 (USD $ Bln) 49
Figure 11: Market Value Share of Smartphone 2012 50
Figure 12: Market Ecosystem Comparison of Smartphone(Copyright chetan Sharma
Consulting) 50
Figure 13: APAC vs. Europe vs. North America vs. Latin America vs. Africa: mSecurity
Market Value % 2012-2017 51
Figure 14: Mobile Subscriber % of Total Global: APAC vs. Europe vs. North America vs.
Latin America vs. Africa 2012-2017 51
Figure 15: APAC vs. Europe vs. North America vs. Latin America vs. Africa: mSecurity
Market Value in USD mln 2012-2017 52
Figure 16: CAGR comparison of APAC vs. Europe vs. North America vs. Latin America
vs. Africa during 2012-2017 52
Figure 17: Mobile security software pre-installed with smartphones & tablets %
projection 2012-2017 53
Figure 18: % of Mobile Device Owner Installed vs. Not installed up-to-date security
software 2012-2017 54
Figure 19: Mobile Related Cyber Crime Victim vs. Unaware about Mobile Security
Measure: % among Mobile Device Owner 54
8. Figure 21: Market share of mobile security company in China 2012 59
Figure 22: Total Mobile Security Product User vs. Active User in China 2012 59
Figure 23: Symbian vs. Anrroid new virus number 2010-2012 Q1 60
Figure 24: Type of virus on Symbian vs. Android in China 2012 60
Figure 25: Mobile Internet User Projection in China 2012-2017 61
Figure 26: Mobile Internet user of USA 2012-2017 61
Figure 27: Active vs. Inactive Mobile Antivirus User 62
Figure 28: Types of Botnet in USA as of 2012 62
Figure 29: Spam Types In USA as of 2012 63
Figure 30: Mobile Internet User of UK 2012-2017 63
Figure 31: Active vs. Inactive Mobile Antivirus software user 2012 64
Figure 32: Types of Botnet in UK as of 2012 64
Figure 33: Mobile Internet User of Russia 2012-2017 65
Figure 34: Mobile Antivirus software user 2012 65
Figure 35: Platform use to spread Spam on Mobile device 66
Figure 36: Mobile Internet User 2012-2017 66
Figure 37: Active vs. Inactive Mobile Antivirus software user 2012 67
Figure 38: Common types of spam in Russia as of 2012 67
Figure 39: Mobile Internet User 2012-2017 68
Figure 40: Mobile Antivirus software user 68
Figure 41: Common types of spam 2012 69
Figure 42: Mobile Internet User 2012-2017 69
Figure 43: Mobile Antivirus software user 70
Figure 44: Common Spam Types in India 2012 70
Figure 45: Mobile Internet User 2012-2017 71
Figure 46: Mobile Antivirus software user 71
Figure 47: Platform use to spread Spam on Mobile device 72
Figure 48: Mobile Internet User 2012-2017 72
Figure 49: Mobile Antivirus software user 2012 73
Figure 50: Mobile Internet User 2012-2017 73
Figure 51: Mobile Antivirus software user 2012 74
Figure 52: Mobile Internet User 2012-2017 74
Figure 53: Mobile Antivirus software user 75
Figure 54: Mobile Internet User 2012-2017 75
Figure 55: Mobile Antivirus software user 76
Figure 56: Worlwide Antivirus Software Vendors (Copyright: opsvvat) 80
Figure 57: Worldwide Mobile Device Sales [1st Qtr 2012] 84
Figure 58: T-Mobile Security Interface (copyright: T-Mobile) 86
Figure 59: Latest Mobile Threat by Type 2012 (Jan – July) 89
Figure 60: Mobile Threats vs. Staged Payload (copyright: Symantec) 91
Figure 61: Mobile Threats: Android.Jmshider (copyright: Symantec) 92
9. Figure 62: Mobile Threat: Example of In-App Promotion To Download Threat (copyright:
Symantec) 93
Figure 63: Mobile threats - embedded Trojan (copyright: Symantec) 95
Figure 64: Mobile threats- Android.Geinimi: a back door Trojan Scenario (copyright:
Symantec) 96
Figure 65: Mobile threats: Group III type mobile threats – storefront apps (copyright:
Symantec) 97
List of Tables
Table 1: Mobile Personalization by Regions 47
Table 2: Market Value Projection by Countries: top 13 countries 53
Table 3: Mobile OS ranking while security issue considered top 55
Table 4: Mobile Handset Unit vs. Market Share by OS platform 2012 85
Contact: kabir@mindcommerce.com