Mobile changes everything, no one is safe

525 views
446 views

Published on

Mobile security changes everything no one is safe. The risks associated with todays mobile usage are on the increase 1200%, how are you going to protect yourself?

Published in: Business, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
525
On SlideShare
0
From Embeds
0
Number of Embeds
23
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Mobile changes everything, no one is safe

  1. 1. The Power To SecureMobilechangeseverythingno one isSafe…Jorge SebastiaoCOO
  2. 2. Motivations
  3. 3. Complexity
  4. 4. Apps, Apps, Apps, …
  5. 5. APPs leak data
  6. 6. mRAT spyware bypassesmobile enterprise controls
  7. 7. Gowalla address book grabwithout asking?
  8. 8. Mobile Location and GPSnot Protected
  9. 9. SMiShing
  10. 10. ViShing
  11. 11. Fake SMS news alerts
  12. 12. MobileMalware up1,200% Q12012
  13. 13. Malware by platform
  14. 14. iPhone Hack Pw2Own
  15. 15. Android wipeout
  16. 16. Token in your pocket
  17. 17. Mobile paymentsvulnerable
  18. 18. Android Emailvulnerable
  19. 19. Android Fakebanking tokens
  20. 20. 1.7Mil Apps High Risk
  21. 21. FinFisher toolkit
  22. 22. Mobilityput risk everywhere.
  23. 23. Attackswill be everywhereMainframeMinicomputerPCDesktop/InternetMobileInternet1101001000100001000001000000100000001940 1960 1980 2000 2020 2040Devices/Users(millions)YearRef: ITU, Morgan Stanley Research, 2009- Smartphone- Tablets- Car Electronics-- Mobile Medicine-- Pay Systems-- Mobile Banking- GPS/Navigation- Mobile Video- Home Entertain- Games- Home Appliance
  24. 24. Mobile Changes EverythingNo One’s Safe
  25. 25. BYOD becomes BYOM
  26. 26. MDM is not MDSM
  27. 27. Are your passwords are timeless?
  28. 28. URL? & QR Codes
  29. 29. Wireless Hotspots, Public
  30. 30. Safe Disposal
  31. 31. Mobile AttackKnowledgeBaseBuild Mobile IntelligenceSourcesIntelPartners,Vendors,CERT ,…InternalSecurityResearchInternet,Mailing listsand othersourcesMobileIncidence Response
  32. 32. Better Incidence ResponseAnalyseContainEliminateRestoreLessonsPolicy Refine PolicyContinuous MonitoringT-1 T 0 T 1 T 1 T 3 T 4 T NCommunicate
  33. 33. Securing Device
  34. 34. Securing Voice & SMS
  35. 35. Securing Applications &Emails, Contacts,…CompanyEnvironmentCompanySecurityUserEnvironmentUserSecurity
  36. 36. Securing mobilecollaborationHosted Services for companiesSENSE MobileAccess- BYOD ready- End-to-endcontrol- Highly secureTraditional Access- For internal usersCarrierCustom ServicesStandardSENSE
  37. 37. The Power To SecureQ&A…http://linkedin.com/in/sebastiao

×