SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
Mobile Security and Privacy in 3G & LTE:
Strategies, Solutions and Market Forecast
Analysis 2012-2017
URL: http://mindcommerce.com/Publications/MobileSecurityPrivacy_2012-2017.php
Published: Sep 2012 Pages: 112

Single User: $1,995.00:
                               Company Wide: $4,995.00:
                                 Team License: $2,865.00




This market has been initially driven by business concerns about protection of corporate
assets and information. Mobile threats are becoming increasingly prolific as the mobile
platform continues to gain popularity through the adoption of smart devices. As end-
users and businesses come to rely on smartphones and tablets in their personal and
business activities, they store valuable information that is attracting the attention of
cybercriminals.
National mobile security markets in Europe, North America and the Asia Pacific region
will experience the strongest growth. BRIC nations will also show signs of a burgeoning
mobile security market as their populations increasingly adopt smart devices.
This research evaluates the mobile security and privacy ecosystem and vendor/solution
analysis including several case studies. It analyzes current and anticipated security and
privacy concerns and associated solutions. It identifies most likely and impactful mobile
threats and related strategies for defense. The report provides market projection
analysis on a global, regional, and country basis for 2012 through 2017.
This report also provide country-specific mobile security market analysis for Australia,
Brazil, Canada, China, France, Germany, India, Russia, UK, and USA as well as regional
analysis for the Middle East and Southeast Asia. It also includes analysis of the
following network operator initiatives in mobile security/privacy: Airtel, AT&T, MTS,
Orange, Saudi Telecom, Telefonica, T-Mobile, Verizon, and Vodafone.


Target Audience:
•     Mobile/wireless service providers
•     Mobile security and privacy vendors
•     Mobile/wireless device manufacturers
•     Mobile/wireless application developers
•     Government and regulatory organizations
•     Law enforcement including police and others

Table of Contents:
1.0 EXECUTIVE SUMMARY 9
2.0 MOBILE SECURITY THREAT AND PRIVACY MARKET OVERVIEW 10
3.0 UNDERSTANDING MOBILE SECURITY: 11
3.1 DEFINING MOBILE SECURITY: 11
3.2 MOBILE DEVICE SECURITY 11
4.0 UNDERSTANDING MOBILE THREATS 13
4.1 WEB BASED THREAT 13
4.2 PHISHING SCAMS 13
4.3 DRIVE-BY DOWNLOADS: 13
4.4 BROWSER EXPLOITS: 13
4.5 WI-FI SNIFFING 14
4.6 SOCIAL ENGINEERING ATTACKS 15
4.7 RESOURCE ABUSE 15
4.8 DATA LOSS 15
4.9 DATA INTEGRITY THREATS 16
5.0 UNDERSTANDING MOBILE PRIVACY 17
5.1 THE TYPES OF THREAT 17
5.2 THE THREAT SMARTPHONES POSE TO BUSINESSES 17
5.3 THE SOPHISTICATION OF THE MOBILE DEVICE IS IT’S OWN WORST ENEMY: 17
5.4 THE BIG PROBLEM WITH DOWNLOADABLE MOBILE APPS 17
5.5 REMOTELY HOSTED MOBILE APPLICATIONS AND DATA: 18
5.6 THE PROBLEMS WITH GSM: 18
5.7 THE GROWTH OF MACHINE TO MACHINE (M2M) 18
5.8 THE BIGGEST MYTH ABOUT MOBILE SECURITY 19
6.0 MOBILE ATTACKS AND VULNERABILITIES REVIEW 2011 20
6.1 JANUARY TO DECEMBER 2011 20
6.2 APPLE IOS VULNERABILITIES 21
6.3 DIRECT ATTACKS 21
6.4 BROWSER-BASED THREATS 22
6.5 THE BASIC STEPS TO PERFORM THIS ATTACK INCLUDE: 22
6.6 THREAT FOR SMBS (SMALL & MEDIUM BUSINESSES) 23
7.0 MOBILE SECURITY THREAT BY OS PLATFORM 24
7.1 IOS 24
7.2 SUMMARY OF IOS SECURITY 24
7.3 ANDROID 25
7.4 SUMMARY OF ANDROID’S SECURITY 26
8.0 MOBILE MALWARE FOR DEVICES 28
9.0 MOBILE DEVICE SECURITY: ANTIVIRUS SOFTWARE 30
9.1 AVG MOBILE SECURITY 30
9.2 KASPERSKY MOBILE SECURITY 30
9.3 ESET MOBILE SECURITY 31
9.4 BULLGUARD MOBILE SECURITY 31
9.5 MCAFEE MOBILE SECURITY 31
9.6 LOOKOUT MOBILE SECURITY 32
9.7 F-SECURE MOBILE SECURITY 32
9.8 NORTON SMARTPHONE SECURITY 32
9.9 TREND MICRO MOBILE SECURITY 32
9.10 DR. WEB MOBILE SECURITY SUITE 33
10.0 MOBILE SECURITY TREND ANALYSIS 34
10.1 NETWORK SECURITY TREND 34
10.1.1 RANSOMWARE TO TAKE MOBILE DEVICES HOSTAGE 34
10.1.2 WORMING INTO ANDROID 34
10.1.3 POLYMORPHISM WANT A CRACKER? 34
10.1.4 CLAMPDOWN ON NETWORK-BASED MONEY LAUNDERING 35
10.1.5 PUBLIC-PRIVATE RELATIONSHIPS IN SECURITY 35
10.1.6 SCADA UNDER THE SCOPE 35
10.1.7 SPONSORED ATTACKS 36
10.1.8 HACKING A GOOD CAUSE 36
10.2 MOBILE VIRTUAL PRIVATE NETWORK TREND 37
10.3 CLOUD BASE SECURITY: 38
10.4 CASE ANALYSIS: OBLIVIOUS DATA LOSS AND THE WILD WEST OF MOBILE APP
SECURITY 39
10.4.1 IN A WORST CASE SCENARIO, THEN, EXACTLY WHAT ARE THE RISKS OF
OBLIVIOUS DATA LOSS? 40
11.0 TOP SECURITY THREAT TREND IN 2012 42
11.1 SOCIAL MEDIA AND THE WEB: 42
11.2 SECURITY MEANS MORE THAN MICROSOFT: 42
11.3 MOBILE DEVICES IN THE SPOTLIGHT 42
11.4 NEW WEB AND NETWORK TECHNOLOGIES 42
11.5 CASUAL CONSUMERIZATION CAUSES BACKSLIDING 42
11.6 MORE HACKTIVISM AND TARGETED ATTACKS 42
11.7 DATA REGULATIONS PROLIFERATE AND PENALTIES GROW 42
11.8 MOBILE PAYMENT TECHNOLOGY MAY BE NEW TARGET 43
11.9 CLOUD SERVICES ARE BACK IN VOGUE 43
11.10 THE BASICS STILL GO WRONG 43
12.0 GROWTH DRIVER ON TODAY’S MOBILE SECURITY & PRIVACY LANDSCAPE 44
12.1 PROLIFERATION OF SMARTPHONE & INTELLIGENT MOBILE COMPUTING DEVICES
44
12.2 INCREASING DEMAND OF DATA SERVICES 45
12.3 GROWING DEMAND ON USING OF CORPORATE AND OPEN NETWORKS 46
12.4 DEVELOPMENT OF MCOMMERCE 46
12.5 MOBILE ENTERTAINMENT PROLIFERATION 47
12.6 MOBILE PERSONALIZATION DEMAND AND MSECURITY 47
12.7 GROWTH OF OPEN SOURCE OS LIKE ANDROID 47
13.0 MOBILE SECURITY MARKET PROJECTION 2012-2017: GLOBAL VS. REGIONAL VS.
NATIONAL 49
13.1 GLOBAL MARKET VALUE ON SPENDING 2012-2017 49
13.2 MARKET VALUE SHARE ACROSS ECO-SYSTEM 2012-2017 49
13.3 REGIONAL MARKET VALUE SHARE IN % VS. MOBILE SUBSCRIBER % (APAC VS.
EUROPE VS. NORTH AMERICA VS. LATIN AMERICA VS. AFRICA) 51
13.4 REGIONAL MARKET VALUE IN USD MLN: APAC VS. EUROPE VS. NORTH AMERICA
VS. LATIN AMERICA VS. AFRICA 2012-2017 52
13.5 CAGR COMPARISON OF 2012 TO 2017(APAC VS. EUROPE VS. NORTH AMERICA
VS. LATIN AMERICA VS. AFRICA) 52
13.6 NATIONAL MARKET VALUE PROJECTION OF TOP 13 COUNTRIES/TERRITORIES
2012-2017 53
13.7 SECURITY SOFTWARE PRE-INSTALLED PROJECTION AMONG TOTAL
SMARTPHONES & TABLETS 2012-2017 53
13.8 UP-TO-DATE SECURITY SOFTWARE USE BEHAVIOR AMONG MOBILE DEVICE
OWNER: % OF INSTALLED VS. NOT INSTALLED 2012-2017 54
13.9 MOBILE RELATED CYBER CRIME VICTIM VS. UNAWARE ABOUT MOBILE SECURITY
MEASURE: % AMONG MOBILE DEVICE OWNER 54
13.10 MOBILE OS RANKING AS PER DEVICE SECURITY 55
13.10.1 WHICH MOBILE OS CAN ENSURE HIGHEST SECURITY? 57
13.11 MOBILE SECURITY COMPANY MERGER & ACQUISITION TREND 2011-2012 58
13.12 INVESTMENT TREND AND OPTION IN MOBILE SECURITY BUSINESS 58
14.0 COUNTRY SPECIFIC MOBILE SECURITY MARKET ANALYSIS 59
14.1 CHINA 59
14.1.1 MOBILE SECURITY MARKET SHARE 2012 59
14.1.2 TOTAL MOBILE SECURITY PRODUCT USER VS. ACTIVE USER 2012 59
14.1.3 SYMBIAN VS. ANDROID: NEW VIRUS NUMBER 2010-2012 Q1 60
14.1.4 SYMBIAN VS. ANDROID: TYPES OF VIRUS 2012 60
14.1.5 MOBILE INTERNET USER PROJECTION 2012-2017 61
14.2 USA 61
14.2.1 MOBILE INTERNET USER 2012-2017 61
14.2.2 % OF MOBILE ANTIVIRUS SOFTWARE USER AMONG TOTAL MOBILE INTERNET
USER 62
14.2.3 BOTNET ON SPREADING VIRUS 2012 62
14.2.4 PLATFORM USE TO SPREAD SPAM ON MOBILE DEVICE 63
14.3 UK 63
14.3.1 MOBILE INTERNET USER 2012 – 2017 63
14.3.2 MOBILE ANTIVIRUS SOFTWARE 2012 64
14.3.3 BOTNET ON SPREADING VIRUS 64
14.4 RUSSIA 65
14.4.1 MOBILE INTERNET USER 65
14.4.2 MOBILE ANTIVIRUS SOFTWARE USER 2012 65
14.4.3 COMMON TYPES OF SPAM 2012 66
14.5 FRANCE 66
14.5.1 MOBILE INTERNET USER 66
14.5.2 MOBILE ANTIVIRUS SOFTWARE 2012 67
14.5.3 COMMON TYPES OF SPAM 2012 67
14.6 BRAZIL: 68
14.6.1 MOBILE INTERNET USER 68
14.6.2 MOBILE ANTIVIRUS SOFTWARE: 68
14.6.3 PLATFORM USE TO SPREAD SPAM ON MOBILE DEVICE 69
14.7 INDIA 69
14.7.1 MOBILE INTERNET USER 69
14.7.2 MOBILE ANTIVIRUS SOFTWARE 2012 70
14.7.3 COMMON SPAM TYPES IN INDIA 70
14.8 GERMANY 71
14.8.1 MOBILE INTERNET USER 71
14.8.2 MOBILE ANTIVIRUS SOFTWARE 71
14.8.3 PLATFORM USE TO SPREAD SPAM ON MOBILE DEVICE 72
14.9 AUSTRALIA 72
14.9.1 MOBILE INTERNET USER 72
14.9.2 MOBILE ANTIVIRUS SOFTWARE 2012 73
14.10 MIDDLE EAST 73
14.10.1 MOBILE INTERNET USER 73
14.10.2 MOBILE ANTIVIRUS SOFTWARE 2012 74
14.11 SOUTH EAST ASIA 74
14.11.1 MOBILE INTERNET USER 74
14.11.2 MOBILE ANTIVIRUS SOFTWARE 2012 75
14.12 CANADA 75
14.12.1 MOBILE INTERNET USER 75
14.12.2 MOBILE ANTIVIRUS SOFTWARE 2012 76
15.0 MOBILE SECURITY VENDOR / SOLUTION PROVIDER ANALYSIS 77
15.1 VENDOR INVESTMENT INITIATIVE 2012 77
15.1.1 LOOKOUT MOBILE 77
15.1.2 SYMANTEC 77
15.1.3 MCAFEE 77
15.1.4 JUNIPER NETWORKS 77
15.1.5 CISCO 77
15.1.6 TREND MICRO 77
15.2 AVAST REVIEW 78
15.3 WORLDWIDE ANTIVIRUS SOFTWARE MARKET ANALYSIS 80
16.0 SMARTPHONE SECURITY VULNERABILITY 82
17.0 MOBILE SECURITY MERGERS AND ACQUISITIONS (M&A). 83
18.0 MOBILE HANDSET / OS PROVIDER INITIATIVE ANALYSIS 84
19.0 TELECOM NETWORK PROVIDER INITIATIVE ANALYSIS 86
19.1 AT&T 86
19.2 VODAFONE 86
19.3 T-MOBILE 86
19.4 ORANGE 86
19.5 SAUDI TELECOM 87
19.6 VERIZON 87
19.7 TELEFONICA 87
19.8 AIRTEL 87
19.9 MTS 88
20.0 MOBILE THREAT LANDSCAPE REVIEW JAN-JULY 2012 89
20.1 LATEST THREATS BY TYPE 2012 (JAN – JULY) 89
20.2 NEW VARIANTS OF ALREADY KNOWN FAMILIES 89
21.0 MOBILE PRIVACY LANDSCAPE REVIEW: DO-NOT-TRACK DEBATE 90
22.0 MOBILE SECURITY CASE ANALYSIS 91
22.1 A SYMANTEC CASE: MOBILE HACKERS IN THE VALUE CHAIN 91
22.2 A TROJAN CASE: THE RISE OF MOBILE THREATS WITH POLITICAL AGENDAS 94
22.3 BRITISH ROYAL MOBILE PHONE HACKING CASE 98
22.3.1 CAN IT BE STOPPED? 99
23.0 MOBILE PRIVACY CASE ANALYSIS 101
23.1 PANDALABS PRIVACY VIOLATION PREDICTION CASE – THE BIGGEST SECURITY
THREAT OF 2012 102
23.1.1 MOBILE MALWARE 103
23.1.2 MALWARE FOR TABLETS 103
23.1.3 MAC MALWARE 103
23.1.4 PC MALWARE 103
23.1.5 SMBS UNDER ATTACK 104
23.1.6 WINDOWS 8 104
23.2 MOBILE PRIVACY THREAT CASE TO TRAVEL STORES 104
23.2.1 HEALTHCARE MOBILE DATA LOSS CASE STUDY 105
24.0 CONCLUSION & RECOMMENDATIONS: 106
24.1 CONCLUSION 106
24.2 RECOMMENDED 10 BEST PROTECTION PRACTICES AGAINST MOBILE THREAT 107
24.3 RECOMMENDED PROTECTION AGAINST MOBILE PRIVACY VIOLATION 109
24.3.1 MOBILE ANTIVIRUS 109
24.3.2 SECURE BROWSER 109
24.3.3 MOBILE DEVICE MANAGEMENT (MDM) 110
24.3.4 ENTERPRISE SANDBOX 110
24.3.5 DATA LOSS PREVENTION (DLP) 111
24.3.6 DEVICE SECURITY MODELS 111
List of Figures
Figure 1: Mobile device threat Diagram 12
Figure 2: % of Web Based Threat 13
Figure 3: User’s email account on an Apple iPad exploited by the Firesheep tool
(copyright: Yahoo) 14
Figure 4: Diagram of Protection against Mobile to Mobile threat 16
Figure 5: Mobile malware in multipurpose 29
Figure 6: Mobile Overtaking Web (copyright: Morgan Stanley) 45
Figure 7: Global Mobile Data Traffic Forecast by Region (copyright: Cisco) 45
Figure 8: Growth of Mobile commerce 46
Figure 9: growth of android market share 48
Figure 10: Global mSecurity Market Value on Spending 2012-2017 (USD $ Bln) 49
Figure 11: Market Value Share of Smartphone 2012 50
Figure 12: Market Ecosystem Comparison of Smartphone(Copyright chetan Sharma
Consulting) 50
Figure 13: APAC vs. Europe vs. North America vs. Latin America vs. Africa: mSecurity
Market Value % 2012-2017 51
Figure 14: Mobile Subscriber % of Total Global: APAC vs. Europe vs. North America vs.
Latin America vs. Africa 2012-2017 51
Figure 15: APAC vs. Europe vs. North America vs. Latin America vs. Africa: mSecurity
Market Value in USD mln 2012-2017 52
Figure 16: CAGR comparison of APAC vs. Europe vs. North America vs. Latin America
vs. Africa during 2012-2017 52
Figure 17: Mobile security software pre-installed with smartphones & tablets %
projection 2012-2017 53
Figure 18: % of Mobile Device Owner Installed vs. Not installed up-to-date security
software 2012-2017 54
Figure 19: Mobile Related Cyber Crime Victim vs. Unaware about Mobile Security
Measure: % among Mobile Device Owner 54
Figure 21: Market share of mobile security company in China 2012 59
Figure 22: Total Mobile Security Product User vs. Active User in China 2012 59
Figure 23: Symbian vs. Anrroid new virus number 2010-2012 Q1 60
Figure 24: Type of virus on Symbian vs. Android in China 2012 60
Figure 25: Mobile Internet User Projection in China 2012-2017 61
Figure 26: Mobile Internet user of USA 2012-2017 61
Figure 27: Active vs. Inactive Mobile Antivirus User 62
Figure 28: Types of Botnet in USA as of 2012 62
Figure 29: Spam Types In USA as of 2012 63
Figure 30: Mobile Internet User of UK 2012-2017 63
Figure 31: Active vs. Inactive Mobile Antivirus software user 2012 64
Figure 32: Types of Botnet in UK as of 2012 64
Figure 33: Mobile Internet User of Russia 2012-2017 65
Figure 34: Mobile Antivirus software user 2012 65
Figure 35: Platform use to spread Spam on Mobile device 66
Figure 36: Mobile Internet User 2012-2017 66
Figure 37: Active vs. Inactive Mobile Antivirus software user 2012 67
Figure 38: Common types of spam in Russia as of 2012 67
Figure 39: Mobile Internet User 2012-2017 68
Figure 40: Mobile Antivirus software user 68
Figure 41: Common types of spam 2012 69
Figure 42: Mobile Internet User 2012-2017 69
Figure 43: Mobile Antivirus software user 70
Figure 44: Common Spam Types in India 2012 70
Figure 45: Mobile Internet User 2012-2017 71
Figure 46: Mobile Antivirus software user 71
Figure 47: Platform use to spread Spam on Mobile device 72
Figure 48: Mobile Internet User 2012-2017 72
Figure 49: Mobile Antivirus software user 2012 73
Figure 50: Mobile Internet User 2012-2017 73
Figure 51: Mobile Antivirus software user 2012 74
Figure 52: Mobile Internet User 2012-2017 74
Figure 53: Mobile Antivirus software user 75
Figure 54: Mobile Internet User 2012-2017 75
Figure 55: Mobile Antivirus software user 76
Figure 56: Worlwide Antivirus Software Vendors (Copyright: opsvvat) 80
Figure 57: Worldwide Mobile Device Sales [1st Qtr 2012] 84
Figure 58: T-Mobile Security Interface (copyright: T-Mobile) 86
Figure 59: Latest Mobile Threat by Type 2012 (Jan – July) 89
Figure 60: Mobile Threats vs. Staged Payload (copyright: Symantec) 91
Figure 61: Mobile Threats: Android.Jmshider (copyright: Symantec) 92
Figure 62: Mobile Threat: Example of In-App Promotion To Download Threat (copyright:
Symantec) 93
Figure 63: Mobile threats - embedded Trojan (copyright: Symantec) 95
Figure 64: Mobile threats- Android.Geinimi: a back door Trojan Scenario (copyright:
Symantec) 96
Figure 65: Mobile threats: Group III type mobile threats – storefront apps (copyright:
Symantec) 97
List of Tables
Table 1: Mobile Personalization by Regions 47
Table 2: Market Value Projection by Countries: top 13 countries 53
Table 3: Mobile OS ranking while security issue considered top 55
Table 4: Mobile Handset Unit vs. Market Share by OS platform 2012 85

             Contact: kabir@mindcommerce.com

Weitere ähnliche Inhalte

Mehr von Kabir Ahmad

Facebook vs non facebook social network gaming 2013 - 2018
Facebook vs non facebook social network gaming 2013 - 2018Facebook vs non facebook social network gaming 2013 - 2018
Facebook vs non facebook social network gaming 2013 - 2018Kabir Ahmad
 
NGN OSS/BSS 2013 - 2018
NGN OSS/BSS 2013 - 2018NGN OSS/BSS 2013 - 2018
NGN OSS/BSS 2013 - 2018Kabir Ahmad
 
Enterprise byod challenges and next generation over the-top (ott) solutions
Enterprise byod challenges and next generation over the-top (ott) solutionsEnterprise byod challenges and next generation over the-top (ott) solutions
Enterprise byod challenges and next generation over the-top (ott) solutionsKabir Ahmad
 
Mobile gaming economy Asia & Opportunity for Banks/Micro Transaction Processors
Mobile gaming economy Asia & Opportunity for Banks/Micro Transaction Processors Mobile gaming economy Asia & Opportunity for Banks/Micro Transaction Processors
Mobile gaming economy Asia & Opportunity for Banks/Micro Transaction Processors Kabir Ahmad
 
SoLoMo & Location game play behavior in free2play, virtual goods & hy...
SoLoMo & Location game play behavior in free2play, virtual goods & hy...SoLoMo & Location game play behavior in free2play, virtual goods & hy...
SoLoMo & Location game play behavior in free2play, virtual goods & hy...Kabir Ahmad
 
Mobile Technology in Journalism
Mobile Technology in JournalismMobile Technology in Journalism
Mobile Technology in JournalismKabir Ahmad
 
Mobile barcodes marketing 2012-2017
Mobile barcodes marketing 2012-2017Mobile barcodes marketing 2012-2017
Mobile barcodes marketing 2012-2017Kabir Ahmad
 
NGN China & Korea 2012-2017
NGN China & Korea 2012-2017NGN China & Korea 2012-2017
NGN China & Korea 2012-2017Kabir Ahmad
 
NGN Japan 2012-2017
NGN Japan 2012-2017NGN Japan 2012-2017
NGN Japan 2012-2017Kabir Ahmad
 
Digital marketing guideline for prothom alo
Digital marketing guideline for prothom aloDigital marketing guideline for prothom alo
Digital marketing guideline for prothom aloKabir Ahmad
 
Smart Phones New User Paradigms and Behaviors
Smart Phones New User Paradigms and BehaviorsSmart Phones New User Paradigms and Behaviors
Smart Phones New User Paradigms and BehaviorsKabir Ahmad
 
Gamification 2012 - 2017: Opportunities and Market Outlook for Next Generatio...
Gamification 2012 - 2017: Opportunities and Market Outlook for Next Generatio...Gamification 2012 - 2017: Opportunities and Market Outlook for Next Generatio...
Gamification 2012 - 2017: Opportunities and Market Outlook for Next Generatio...Kabir Ahmad
 
Mobile Gaming Asia: Market and Forecast Analysis
Mobile Gaming Asia: Market and Forecast AnalysisMobile Gaming Asia: Market and Forecast Analysis
Mobile Gaming Asia: Market and Forecast AnalysisKabir Ahmad
 

Mehr von Kabir Ahmad (14)

Facebook vs non facebook social network gaming 2013 - 2018
Facebook vs non facebook social network gaming 2013 - 2018Facebook vs non facebook social network gaming 2013 - 2018
Facebook vs non facebook social network gaming 2013 - 2018
 
NGN OSS/BSS 2013 - 2018
NGN OSS/BSS 2013 - 2018NGN OSS/BSS 2013 - 2018
NGN OSS/BSS 2013 - 2018
 
Enterprise byod challenges and next generation over the-top (ott) solutions
Enterprise byod challenges and next generation over the-top (ott) solutionsEnterprise byod challenges and next generation over the-top (ott) solutions
Enterprise byod challenges and next generation over the-top (ott) solutions
 
Mobile gaming economy Asia & Opportunity for Banks/Micro Transaction Processors
Mobile gaming economy Asia & Opportunity for Banks/Micro Transaction Processors Mobile gaming economy Asia & Opportunity for Banks/Micro Transaction Processors
Mobile gaming economy Asia & Opportunity for Banks/Micro Transaction Processors
 
SoLoMo & Location game play behavior in free2play, virtual goods & hy...
SoLoMo & Location game play behavior in free2play, virtual goods & hy...SoLoMo & Location game play behavior in free2play, virtual goods & hy...
SoLoMo & Location game play behavior in free2play, virtual goods & hy...
 
Mobile Technology in Journalism
Mobile Technology in JournalismMobile Technology in Journalism
Mobile Technology in Journalism
 
Mobile barcodes marketing 2012-2017
Mobile barcodes marketing 2012-2017Mobile barcodes marketing 2012-2017
Mobile barcodes marketing 2012-2017
 
NGN China & Korea 2012-2017
NGN China & Korea 2012-2017NGN China & Korea 2012-2017
NGN China & Korea 2012-2017
 
NGN Japan 2012-2017
NGN Japan 2012-2017NGN Japan 2012-2017
NGN Japan 2012-2017
 
Digital marketing guideline for prothom alo
Digital marketing guideline for prothom aloDigital marketing guideline for prothom alo
Digital marketing guideline for prothom alo
 
Gamification
GamificationGamification
Gamification
 
Smart Phones New User Paradigms and Behaviors
Smart Phones New User Paradigms and BehaviorsSmart Phones New User Paradigms and Behaviors
Smart Phones New User Paradigms and Behaviors
 
Gamification 2012 - 2017: Opportunities and Market Outlook for Next Generatio...
Gamification 2012 - 2017: Opportunities and Market Outlook for Next Generatio...Gamification 2012 - 2017: Opportunities and Market Outlook for Next Generatio...
Gamification 2012 - 2017: Opportunities and Market Outlook for Next Generatio...
 
Mobile Gaming Asia: Market and Forecast Analysis
Mobile Gaming Asia: Market and Forecast AnalysisMobile Gaming Asia: Market and Forecast Analysis
Mobile Gaming Asia: Market and Forecast Analysis
 

Kürzlich hochgeladen

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Kürzlich hochgeladen (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Mobile security and privacy in 3G&LTE

  • 1. Mobile Security and Privacy in 3G & LTE: Strategies, Solutions and Market Forecast Analysis 2012-2017 URL: http://mindcommerce.com/Publications/MobileSecurityPrivacy_2012-2017.php Published: Sep 2012 Pages: 112 Single User: $1,995.00: Company Wide: $4,995.00: Team License: $2,865.00 This market has been initially driven by business concerns about protection of corporate assets and information. Mobile threats are becoming increasingly prolific as the mobile platform continues to gain popularity through the adoption of smart devices. As end- users and businesses come to rely on smartphones and tablets in their personal and business activities, they store valuable information that is attracting the attention of cybercriminals. National mobile security markets in Europe, North America and the Asia Pacific region will experience the strongest growth. BRIC nations will also show signs of a burgeoning mobile security market as their populations increasingly adopt smart devices. This research evaluates the mobile security and privacy ecosystem and vendor/solution analysis including several case studies. It analyzes current and anticipated security and privacy concerns and associated solutions. It identifies most likely and impactful mobile threats and related strategies for defense. The report provides market projection analysis on a global, regional, and country basis for 2012 through 2017. This report also provide country-specific mobile security market analysis for Australia, Brazil, Canada, China, France, Germany, India, Russia, UK, and USA as well as regional analysis for the Middle East and Southeast Asia. It also includes analysis of the following network operator initiatives in mobile security/privacy: Airtel, AT&T, MTS, Orange, Saudi Telecom, Telefonica, T-Mobile, Verizon, and Vodafone. Target Audience:
  • 2. Mobile/wireless service providers • Mobile security and privacy vendors • Mobile/wireless device manufacturers • Mobile/wireless application developers • Government and regulatory organizations • Law enforcement including police and others Table of Contents: 1.0 EXECUTIVE SUMMARY 9 2.0 MOBILE SECURITY THREAT AND PRIVACY MARKET OVERVIEW 10 3.0 UNDERSTANDING MOBILE SECURITY: 11 3.1 DEFINING MOBILE SECURITY: 11 3.2 MOBILE DEVICE SECURITY 11 4.0 UNDERSTANDING MOBILE THREATS 13 4.1 WEB BASED THREAT 13 4.2 PHISHING SCAMS 13 4.3 DRIVE-BY DOWNLOADS: 13 4.4 BROWSER EXPLOITS: 13 4.5 WI-FI SNIFFING 14 4.6 SOCIAL ENGINEERING ATTACKS 15 4.7 RESOURCE ABUSE 15 4.8 DATA LOSS 15 4.9 DATA INTEGRITY THREATS 16 5.0 UNDERSTANDING MOBILE PRIVACY 17 5.1 THE TYPES OF THREAT 17 5.2 THE THREAT SMARTPHONES POSE TO BUSINESSES 17 5.3 THE SOPHISTICATION OF THE MOBILE DEVICE IS IT’S OWN WORST ENEMY: 17 5.4 THE BIG PROBLEM WITH DOWNLOADABLE MOBILE APPS 17 5.5 REMOTELY HOSTED MOBILE APPLICATIONS AND DATA: 18 5.6 THE PROBLEMS WITH GSM: 18 5.7 THE GROWTH OF MACHINE TO MACHINE (M2M) 18 5.8 THE BIGGEST MYTH ABOUT MOBILE SECURITY 19 6.0 MOBILE ATTACKS AND VULNERABILITIES REVIEW 2011 20 6.1 JANUARY TO DECEMBER 2011 20 6.2 APPLE IOS VULNERABILITIES 21 6.3 DIRECT ATTACKS 21 6.4 BROWSER-BASED THREATS 22 6.5 THE BASIC STEPS TO PERFORM THIS ATTACK INCLUDE: 22 6.6 THREAT FOR SMBS (SMALL & MEDIUM BUSINESSES) 23 7.0 MOBILE SECURITY THREAT BY OS PLATFORM 24 7.1 IOS 24
  • 3. 7.2 SUMMARY OF IOS SECURITY 24 7.3 ANDROID 25 7.4 SUMMARY OF ANDROID’S SECURITY 26 8.0 MOBILE MALWARE FOR DEVICES 28 9.0 MOBILE DEVICE SECURITY: ANTIVIRUS SOFTWARE 30 9.1 AVG MOBILE SECURITY 30 9.2 KASPERSKY MOBILE SECURITY 30 9.3 ESET MOBILE SECURITY 31 9.4 BULLGUARD MOBILE SECURITY 31 9.5 MCAFEE MOBILE SECURITY 31 9.6 LOOKOUT MOBILE SECURITY 32 9.7 F-SECURE MOBILE SECURITY 32 9.8 NORTON SMARTPHONE SECURITY 32 9.9 TREND MICRO MOBILE SECURITY 32 9.10 DR. WEB MOBILE SECURITY SUITE 33 10.0 MOBILE SECURITY TREND ANALYSIS 34 10.1 NETWORK SECURITY TREND 34 10.1.1 RANSOMWARE TO TAKE MOBILE DEVICES HOSTAGE 34 10.1.2 WORMING INTO ANDROID 34 10.1.3 POLYMORPHISM WANT A CRACKER? 34 10.1.4 CLAMPDOWN ON NETWORK-BASED MONEY LAUNDERING 35 10.1.5 PUBLIC-PRIVATE RELATIONSHIPS IN SECURITY 35 10.1.6 SCADA UNDER THE SCOPE 35 10.1.7 SPONSORED ATTACKS 36 10.1.8 HACKING A GOOD CAUSE 36 10.2 MOBILE VIRTUAL PRIVATE NETWORK TREND 37 10.3 CLOUD BASE SECURITY: 38 10.4 CASE ANALYSIS: OBLIVIOUS DATA LOSS AND THE WILD WEST OF MOBILE APP SECURITY 39 10.4.1 IN A WORST CASE SCENARIO, THEN, EXACTLY WHAT ARE THE RISKS OF OBLIVIOUS DATA LOSS? 40 11.0 TOP SECURITY THREAT TREND IN 2012 42 11.1 SOCIAL MEDIA AND THE WEB: 42 11.2 SECURITY MEANS MORE THAN MICROSOFT: 42 11.3 MOBILE DEVICES IN THE SPOTLIGHT 42 11.4 NEW WEB AND NETWORK TECHNOLOGIES 42 11.5 CASUAL CONSUMERIZATION CAUSES BACKSLIDING 42 11.6 MORE HACKTIVISM AND TARGETED ATTACKS 42 11.7 DATA REGULATIONS PROLIFERATE AND PENALTIES GROW 42 11.8 MOBILE PAYMENT TECHNOLOGY MAY BE NEW TARGET 43 11.9 CLOUD SERVICES ARE BACK IN VOGUE 43
  • 4. 11.10 THE BASICS STILL GO WRONG 43 12.0 GROWTH DRIVER ON TODAY’S MOBILE SECURITY & PRIVACY LANDSCAPE 44 12.1 PROLIFERATION OF SMARTPHONE & INTELLIGENT MOBILE COMPUTING DEVICES 44 12.2 INCREASING DEMAND OF DATA SERVICES 45 12.3 GROWING DEMAND ON USING OF CORPORATE AND OPEN NETWORKS 46 12.4 DEVELOPMENT OF MCOMMERCE 46 12.5 MOBILE ENTERTAINMENT PROLIFERATION 47 12.6 MOBILE PERSONALIZATION DEMAND AND MSECURITY 47 12.7 GROWTH OF OPEN SOURCE OS LIKE ANDROID 47 13.0 MOBILE SECURITY MARKET PROJECTION 2012-2017: GLOBAL VS. REGIONAL VS. NATIONAL 49 13.1 GLOBAL MARKET VALUE ON SPENDING 2012-2017 49 13.2 MARKET VALUE SHARE ACROSS ECO-SYSTEM 2012-2017 49 13.3 REGIONAL MARKET VALUE SHARE IN % VS. MOBILE SUBSCRIBER % (APAC VS. EUROPE VS. NORTH AMERICA VS. LATIN AMERICA VS. AFRICA) 51 13.4 REGIONAL MARKET VALUE IN USD MLN: APAC VS. EUROPE VS. NORTH AMERICA VS. LATIN AMERICA VS. AFRICA 2012-2017 52 13.5 CAGR COMPARISON OF 2012 TO 2017(APAC VS. EUROPE VS. NORTH AMERICA VS. LATIN AMERICA VS. AFRICA) 52 13.6 NATIONAL MARKET VALUE PROJECTION OF TOP 13 COUNTRIES/TERRITORIES 2012-2017 53 13.7 SECURITY SOFTWARE PRE-INSTALLED PROJECTION AMONG TOTAL SMARTPHONES & TABLETS 2012-2017 53 13.8 UP-TO-DATE SECURITY SOFTWARE USE BEHAVIOR AMONG MOBILE DEVICE OWNER: % OF INSTALLED VS. NOT INSTALLED 2012-2017 54 13.9 MOBILE RELATED CYBER CRIME VICTIM VS. UNAWARE ABOUT MOBILE SECURITY MEASURE: % AMONG MOBILE DEVICE OWNER 54 13.10 MOBILE OS RANKING AS PER DEVICE SECURITY 55 13.10.1 WHICH MOBILE OS CAN ENSURE HIGHEST SECURITY? 57 13.11 MOBILE SECURITY COMPANY MERGER & ACQUISITION TREND 2011-2012 58 13.12 INVESTMENT TREND AND OPTION IN MOBILE SECURITY BUSINESS 58 14.0 COUNTRY SPECIFIC MOBILE SECURITY MARKET ANALYSIS 59 14.1 CHINA 59 14.1.1 MOBILE SECURITY MARKET SHARE 2012 59 14.1.2 TOTAL MOBILE SECURITY PRODUCT USER VS. ACTIVE USER 2012 59 14.1.3 SYMBIAN VS. ANDROID: NEW VIRUS NUMBER 2010-2012 Q1 60 14.1.4 SYMBIAN VS. ANDROID: TYPES OF VIRUS 2012 60 14.1.5 MOBILE INTERNET USER PROJECTION 2012-2017 61 14.2 USA 61 14.2.1 MOBILE INTERNET USER 2012-2017 61
  • 5. 14.2.2 % OF MOBILE ANTIVIRUS SOFTWARE USER AMONG TOTAL MOBILE INTERNET USER 62 14.2.3 BOTNET ON SPREADING VIRUS 2012 62 14.2.4 PLATFORM USE TO SPREAD SPAM ON MOBILE DEVICE 63 14.3 UK 63 14.3.1 MOBILE INTERNET USER 2012 – 2017 63 14.3.2 MOBILE ANTIVIRUS SOFTWARE 2012 64 14.3.3 BOTNET ON SPREADING VIRUS 64 14.4 RUSSIA 65 14.4.1 MOBILE INTERNET USER 65 14.4.2 MOBILE ANTIVIRUS SOFTWARE USER 2012 65 14.4.3 COMMON TYPES OF SPAM 2012 66 14.5 FRANCE 66 14.5.1 MOBILE INTERNET USER 66 14.5.2 MOBILE ANTIVIRUS SOFTWARE 2012 67 14.5.3 COMMON TYPES OF SPAM 2012 67 14.6 BRAZIL: 68 14.6.1 MOBILE INTERNET USER 68 14.6.2 MOBILE ANTIVIRUS SOFTWARE: 68 14.6.3 PLATFORM USE TO SPREAD SPAM ON MOBILE DEVICE 69 14.7 INDIA 69 14.7.1 MOBILE INTERNET USER 69 14.7.2 MOBILE ANTIVIRUS SOFTWARE 2012 70 14.7.3 COMMON SPAM TYPES IN INDIA 70 14.8 GERMANY 71 14.8.1 MOBILE INTERNET USER 71 14.8.2 MOBILE ANTIVIRUS SOFTWARE 71 14.8.3 PLATFORM USE TO SPREAD SPAM ON MOBILE DEVICE 72 14.9 AUSTRALIA 72 14.9.1 MOBILE INTERNET USER 72 14.9.2 MOBILE ANTIVIRUS SOFTWARE 2012 73 14.10 MIDDLE EAST 73 14.10.1 MOBILE INTERNET USER 73 14.10.2 MOBILE ANTIVIRUS SOFTWARE 2012 74 14.11 SOUTH EAST ASIA 74 14.11.1 MOBILE INTERNET USER 74 14.11.2 MOBILE ANTIVIRUS SOFTWARE 2012 75 14.12 CANADA 75 14.12.1 MOBILE INTERNET USER 75 14.12.2 MOBILE ANTIVIRUS SOFTWARE 2012 76 15.0 MOBILE SECURITY VENDOR / SOLUTION PROVIDER ANALYSIS 77
  • 6. 15.1 VENDOR INVESTMENT INITIATIVE 2012 77 15.1.1 LOOKOUT MOBILE 77 15.1.2 SYMANTEC 77 15.1.3 MCAFEE 77 15.1.4 JUNIPER NETWORKS 77 15.1.5 CISCO 77 15.1.6 TREND MICRO 77 15.2 AVAST REVIEW 78 15.3 WORLDWIDE ANTIVIRUS SOFTWARE MARKET ANALYSIS 80 16.0 SMARTPHONE SECURITY VULNERABILITY 82 17.0 MOBILE SECURITY MERGERS AND ACQUISITIONS (M&A). 83 18.0 MOBILE HANDSET / OS PROVIDER INITIATIVE ANALYSIS 84 19.0 TELECOM NETWORK PROVIDER INITIATIVE ANALYSIS 86 19.1 AT&T 86 19.2 VODAFONE 86 19.3 T-MOBILE 86 19.4 ORANGE 86 19.5 SAUDI TELECOM 87 19.6 VERIZON 87 19.7 TELEFONICA 87 19.8 AIRTEL 87 19.9 MTS 88 20.0 MOBILE THREAT LANDSCAPE REVIEW JAN-JULY 2012 89 20.1 LATEST THREATS BY TYPE 2012 (JAN – JULY) 89 20.2 NEW VARIANTS OF ALREADY KNOWN FAMILIES 89 21.0 MOBILE PRIVACY LANDSCAPE REVIEW: DO-NOT-TRACK DEBATE 90 22.0 MOBILE SECURITY CASE ANALYSIS 91 22.1 A SYMANTEC CASE: MOBILE HACKERS IN THE VALUE CHAIN 91 22.2 A TROJAN CASE: THE RISE OF MOBILE THREATS WITH POLITICAL AGENDAS 94 22.3 BRITISH ROYAL MOBILE PHONE HACKING CASE 98 22.3.1 CAN IT BE STOPPED? 99 23.0 MOBILE PRIVACY CASE ANALYSIS 101 23.1 PANDALABS PRIVACY VIOLATION PREDICTION CASE – THE BIGGEST SECURITY THREAT OF 2012 102 23.1.1 MOBILE MALWARE 103 23.1.2 MALWARE FOR TABLETS 103 23.1.3 MAC MALWARE 103 23.1.4 PC MALWARE 103 23.1.5 SMBS UNDER ATTACK 104 23.1.6 WINDOWS 8 104 23.2 MOBILE PRIVACY THREAT CASE TO TRAVEL STORES 104
  • 7. 23.2.1 HEALTHCARE MOBILE DATA LOSS CASE STUDY 105 24.0 CONCLUSION & RECOMMENDATIONS: 106 24.1 CONCLUSION 106 24.2 RECOMMENDED 10 BEST PROTECTION PRACTICES AGAINST MOBILE THREAT 107 24.3 RECOMMENDED PROTECTION AGAINST MOBILE PRIVACY VIOLATION 109 24.3.1 MOBILE ANTIVIRUS 109 24.3.2 SECURE BROWSER 109 24.3.3 MOBILE DEVICE MANAGEMENT (MDM) 110 24.3.4 ENTERPRISE SANDBOX 110 24.3.5 DATA LOSS PREVENTION (DLP) 111 24.3.6 DEVICE SECURITY MODELS 111 List of Figures Figure 1: Mobile device threat Diagram 12 Figure 2: % of Web Based Threat 13 Figure 3: User’s email account on an Apple iPad exploited by the Firesheep tool (copyright: Yahoo) 14 Figure 4: Diagram of Protection against Mobile to Mobile threat 16 Figure 5: Mobile malware in multipurpose 29 Figure 6: Mobile Overtaking Web (copyright: Morgan Stanley) 45 Figure 7: Global Mobile Data Traffic Forecast by Region (copyright: Cisco) 45 Figure 8: Growth of Mobile commerce 46 Figure 9: growth of android market share 48 Figure 10: Global mSecurity Market Value on Spending 2012-2017 (USD $ Bln) 49 Figure 11: Market Value Share of Smartphone 2012 50 Figure 12: Market Ecosystem Comparison of Smartphone(Copyright chetan Sharma Consulting) 50 Figure 13: APAC vs. Europe vs. North America vs. Latin America vs. Africa: mSecurity Market Value % 2012-2017 51 Figure 14: Mobile Subscriber % of Total Global: APAC vs. Europe vs. North America vs. Latin America vs. Africa 2012-2017 51 Figure 15: APAC vs. Europe vs. North America vs. Latin America vs. Africa: mSecurity Market Value in USD mln 2012-2017 52 Figure 16: CAGR comparison of APAC vs. Europe vs. North America vs. Latin America vs. Africa during 2012-2017 52 Figure 17: Mobile security software pre-installed with smartphones & tablets % projection 2012-2017 53 Figure 18: % of Mobile Device Owner Installed vs. Not installed up-to-date security software 2012-2017 54 Figure 19: Mobile Related Cyber Crime Victim vs. Unaware about Mobile Security Measure: % among Mobile Device Owner 54
  • 8. Figure 21: Market share of mobile security company in China 2012 59 Figure 22: Total Mobile Security Product User vs. Active User in China 2012 59 Figure 23: Symbian vs. Anrroid new virus number 2010-2012 Q1 60 Figure 24: Type of virus on Symbian vs. Android in China 2012 60 Figure 25: Mobile Internet User Projection in China 2012-2017 61 Figure 26: Mobile Internet user of USA 2012-2017 61 Figure 27: Active vs. Inactive Mobile Antivirus User 62 Figure 28: Types of Botnet in USA as of 2012 62 Figure 29: Spam Types In USA as of 2012 63 Figure 30: Mobile Internet User of UK 2012-2017 63 Figure 31: Active vs. Inactive Mobile Antivirus software user 2012 64 Figure 32: Types of Botnet in UK as of 2012 64 Figure 33: Mobile Internet User of Russia 2012-2017 65 Figure 34: Mobile Antivirus software user 2012 65 Figure 35: Platform use to spread Spam on Mobile device 66 Figure 36: Mobile Internet User 2012-2017 66 Figure 37: Active vs. Inactive Mobile Antivirus software user 2012 67 Figure 38: Common types of spam in Russia as of 2012 67 Figure 39: Mobile Internet User 2012-2017 68 Figure 40: Mobile Antivirus software user 68 Figure 41: Common types of spam 2012 69 Figure 42: Mobile Internet User 2012-2017 69 Figure 43: Mobile Antivirus software user 70 Figure 44: Common Spam Types in India 2012 70 Figure 45: Mobile Internet User 2012-2017 71 Figure 46: Mobile Antivirus software user 71 Figure 47: Platform use to spread Spam on Mobile device 72 Figure 48: Mobile Internet User 2012-2017 72 Figure 49: Mobile Antivirus software user 2012 73 Figure 50: Mobile Internet User 2012-2017 73 Figure 51: Mobile Antivirus software user 2012 74 Figure 52: Mobile Internet User 2012-2017 74 Figure 53: Mobile Antivirus software user 75 Figure 54: Mobile Internet User 2012-2017 75 Figure 55: Mobile Antivirus software user 76 Figure 56: Worlwide Antivirus Software Vendors (Copyright: opsvvat) 80 Figure 57: Worldwide Mobile Device Sales [1st Qtr 2012] 84 Figure 58: T-Mobile Security Interface (copyright: T-Mobile) 86 Figure 59: Latest Mobile Threat by Type 2012 (Jan – July) 89 Figure 60: Mobile Threats vs. Staged Payload (copyright: Symantec) 91 Figure 61: Mobile Threats: Android.Jmshider (copyright: Symantec) 92
  • 9. Figure 62: Mobile Threat: Example of In-App Promotion To Download Threat (copyright: Symantec) 93 Figure 63: Mobile threats - embedded Trojan (copyright: Symantec) 95 Figure 64: Mobile threats- Android.Geinimi: a back door Trojan Scenario (copyright: Symantec) 96 Figure 65: Mobile threats: Group III type mobile threats – storefront apps (copyright: Symantec) 97 List of Tables Table 1: Mobile Personalization by Regions 47 Table 2: Market Value Projection by Countries: top 13 countries 53 Table 3: Mobile OS ranking while security issue considered top 55 Table 4: Mobile Handset Unit vs. Market Share by OS platform 2012 85 Contact: kabir@mindcommerce.com