SlideShare ist ein Scribd-Unternehmen logo
1 von 22
social security By: Mackenzie Hill-Strathy Image by nouspique
As of May 1, 2011, there were 381,062 apps available in the Apple Store. Image by Theory And 294,738 apps available for the Android. That’s 675,800 apps for just two carriers.
Worldwide, over  30 million  apps are downloaded every day  Image by liquidx
Yet at the present, there is little to no  anti-virus protection for mobile phones.  Creating “a very attractive criminal playground.” – Rik Ferguson, BBC  Image by shaggy359
In March 2011, 50 Android apps were found to contain a virus called DroidDream. In disguise as ordinary apps, such as one that allowed you to play the guitar on your phone, the virus collected all data on the phone and sent it to a remote server.   Collectively, these apps were downloaded over 200,000times Image by salendron
The App Genome Project is currently studying 300,000 apps. The study of the first 100,000 has already been completed. So far they have found that: Image byaranarth One third of applications try to get the user’s location 10% try to get at contact and address lists A significant number of apps use copied and pasted code
Image by seandreilinger While it is typical for a family to have only one computer, there could be multiple smart and cell phones per family. Phones have become much more personal and thus, more widespread.
Image by databhi Sympatico reported that last year there were over 286 million threats to computer security  So imagine how many hackers will begin to target mobile technology…
But in reality how cautious are we towards giving out personal information on our smart phones? Image by xadrian
78% are willing to share their gender 75% are willing to share their email address 65% are willing to share their full name (Survey done by TRUSTe) Image by darkolina
Are we simply ignorant that our information is being stolen, do we just not bother to read those 50 page user agreements, or do we merely just not care? Image by Immagina
Image by jon.t Surprisingly, more than half of app users say they have actually read the private policy before downloading an app  However, In TRUSTe’s study of the top 340 free mobile apps, merely 25% had a link to the private policy.
Maybe money is the binding constraint? 37% are willing to share personal information in exchange for free or lower priced apps Image by alles-schlumpf
The rise of geolocational apps only pose an increased threat to mobile security  Yet still only 35% of mobile users are willing to give out their location Image by shapeshift
iPhone users are most likely to give out their location, with 53% vs. 38% for Android.  Most likely because iPhone users feel more secure. Anyone is allowed to post an app in the Android store, leading to a natural hesistation before downloading.  Image by theOOBE Image by SaadIrfan
"Over time, you get used to more…I think people are getting used to sharing more, and they are willing to accept that certain types of things that were private aren't private anymore. We also have certain expectations that have shifted because we just live our lives more online than we ever have.”  – Michael Fauscette, IDC Image by Bright Tal
Image by kk+ But how can you tell if your information has been stolen?
Deteriorating battery life Increased monthly phone bills Strange numbers appearing on phone bills Image by st a ge 8
20 million Right now there is a huge void in the market for mobile security which needs to be filled. From big antivirus companies such as McAfee to smaller telephone manufacturers such as Nokia, everyone is in competition to be the first on the market.   Estimated to be spent  by 2014 Image by Stuck in Commons
IImage by nouspique “It’ll take a little time for this to go mass market.” -John Stankey, AT&T
All images are licensed under the Creative Commons Non-Commercial Share-Alike 3.0 agreement, and sourced from Flickr. Image by kk+
Sources: http://www.mediapost.com/publications/?fa=Articles.showArticle&art_aid=150520 http://www.nationmultimedia.com/2011/05/19/technology/Security-looms-as-growing-mobile-problem-30155683.html http://www.destinationcrm.com/Articles/CRM-News/Daily-News/Privacy-a-Main-Concern-When-Using-Mobile-Apps--75214.aspxhttp://appadvice.com/appnn/2011/01/number-apps-downloaded-day-reaches-30-million http://www.hardocp.com/image.html?image=MTMwNDg3MTk1OVhvMzJsWDRjYXVfMV8xX2wuanBn http://www.bbc.co.uk/news/technology-12633923 http://www.bbc.co.uk/news/technology-10912376 http://www.reuters.com/article/2011/05/18/us-summit-msecurity-idUSTRE74H1NM20110518?type=smallBusinessNews 

Weitere ähnliche Inhalte

Andere mochten auch

Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
Mobile security services 2012
Mobile security services 2012Mobile security services 2012
Mobile security services 2012Tjylen Veselyj
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Omar Khawaja
 
Keeping Mobile Security Simple - Suman (Shuman) Talukdar, Amphion Forum SF 2013
Keeping Mobile Security Simple - Suman (Shuman) Talukdar, Amphion Forum SF 2013Keeping Mobile Security Simple - Suman (Shuman) Talukdar, Amphion Forum SF 2013
Keeping Mobile Security Simple - Suman (Shuman) Talukdar, Amphion Forum SF 2013Suman Talukdar
 
Mobile Information Security
Mobile Information SecurityMobile Information Security
Mobile Information SecurityEvan Francen
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2Santosh Satam
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing PrivacyLookout
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
 
AITP Presentation on Mobile Security
AITP Presentation on Mobile SecurityAITP Presentation on Mobile Security
AITP Presentation on Mobile SecurityJohn D. Johnson
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityJohn Rhoton
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring HackersLookout
 
Mobile Security Basics
Mobile Security BasicsMobile Security Basics
Mobile Security Basicsanandraje
 

Andere mochten auch (16)

Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Mobile security services 2012
Mobile security services 2012Mobile security services 2012
Mobile security services 2012
 
Biometrics
BiometricsBiometrics
Biometrics
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
 
Keeping Mobile Security Simple - Suman (Shuman) Talukdar, Amphion Forum SF 2013
Keeping Mobile Security Simple - Suman (Shuman) Talukdar, Amphion Forum SF 2013Keeping Mobile Security Simple - Suman (Shuman) Talukdar, Amphion Forum SF 2013
Keeping Mobile Security Simple - Suman (Shuman) Talukdar, Amphion Forum SF 2013
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Mobile Information Security
Mobile Information SecurityMobile Information Security
Mobile Information Security
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing Privacy
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
AITP Presentation on Mobile Security
AITP Presentation on Mobile SecurityAITP Presentation on Mobile Security
AITP Presentation on Mobile Security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring Hackers
 
Mobile Security Basics
Mobile Security BasicsMobile Security Basics
Mobile Security Basics
 
Mobile Apps Security
Mobile Apps SecurityMobile Apps Security
Mobile Apps Security
 

Kürzlich hochgeladen

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 

Kürzlich hochgeladen (20)

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

Film315 Mobile Security

  • 1. social security By: Mackenzie Hill-Strathy Image by nouspique
  • 2. As of May 1, 2011, there were 381,062 apps available in the Apple Store. Image by Theory And 294,738 apps available for the Android. That’s 675,800 apps for just two carriers.
  • 3. Worldwide, over 30 million apps are downloaded every day Image by liquidx
  • 4. Yet at the present, there is little to no anti-virus protection for mobile phones. Creating “a very attractive criminal playground.” – Rik Ferguson, BBC Image by shaggy359
  • 5. In March 2011, 50 Android apps were found to contain a virus called DroidDream. In disguise as ordinary apps, such as one that allowed you to play the guitar on your phone, the virus collected all data on the phone and sent it to a remote server. Collectively, these apps were downloaded over 200,000times Image by salendron
  • 6. The App Genome Project is currently studying 300,000 apps. The study of the first 100,000 has already been completed. So far they have found that: Image byaranarth One third of applications try to get the user’s location 10% try to get at contact and address lists A significant number of apps use copied and pasted code
  • 7. Image by seandreilinger While it is typical for a family to have only one computer, there could be multiple smart and cell phones per family. Phones have become much more personal and thus, more widespread.
  • 8. Image by databhi Sympatico reported that last year there were over 286 million threats to computer security So imagine how many hackers will begin to target mobile technology…
  • 9. But in reality how cautious are we towards giving out personal information on our smart phones? Image by xadrian
  • 10. 78% are willing to share their gender 75% are willing to share their email address 65% are willing to share their full name (Survey done by TRUSTe) Image by darkolina
  • 11. Are we simply ignorant that our information is being stolen, do we just not bother to read those 50 page user agreements, or do we merely just not care? Image by Immagina
  • 12. Image by jon.t Surprisingly, more than half of app users say they have actually read the private policy before downloading an app However, In TRUSTe’s study of the top 340 free mobile apps, merely 25% had a link to the private policy.
  • 13. Maybe money is the binding constraint? 37% are willing to share personal information in exchange for free or lower priced apps Image by alles-schlumpf
  • 14. The rise of geolocational apps only pose an increased threat to mobile security Yet still only 35% of mobile users are willing to give out their location Image by shapeshift
  • 15. iPhone users are most likely to give out their location, with 53% vs. 38% for Android. Most likely because iPhone users feel more secure. Anyone is allowed to post an app in the Android store, leading to a natural hesistation before downloading. Image by theOOBE Image by SaadIrfan
  • 16. "Over time, you get used to more…I think people are getting used to sharing more, and they are willing to accept that certain types of things that were private aren't private anymore. We also have certain expectations that have shifted because we just live our lives more online than we ever have.” – Michael Fauscette, IDC Image by Bright Tal
  • 17. Image by kk+ But how can you tell if your information has been stolen?
  • 18. Deteriorating battery life Increased monthly phone bills Strange numbers appearing on phone bills Image by st a ge 8
  • 19. 20 million Right now there is a huge void in the market for mobile security which needs to be filled. From big antivirus companies such as McAfee to smaller telephone manufacturers such as Nokia, everyone is in competition to be the first on the market. Estimated to be spent by 2014 Image by Stuck in Commons
  • 20. IImage by nouspique “It’ll take a little time for this to go mass market.” -John Stankey, AT&T
  • 21. All images are licensed under the Creative Commons Non-Commercial Share-Alike 3.0 agreement, and sourced from Flickr. Image by kk+
  • 22. Sources: http://www.mediapost.com/publications/?fa=Articles.showArticle&art_aid=150520 http://www.nationmultimedia.com/2011/05/19/technology/Security-looms-as-growing-mobile-problem-30155683.html http://www.destinationcrm.com/Articles/CRM-News/Daily-News/Privacy-a-Main-Concern-When-Using-Mobile-Apps--75214.aspxhttp://appadvice.com/appnn/2011/01/number-apps-downloaded-day-reaches-30-million http://www.hardocp.com/image.html?image=MTMwNDg3MTk1OVhvMzJsWDRjYXVfMV8xX2wuanBn http://www.bbc.co.uk/news/technology-12633923 http://www.bbc.co.uk/news/technology-10912376 http://www.reuters.com/article/2011/05/18/us-summit-msecurity-idUSTRE74H1NM20110518?type=smallBusinessNews