Mobile security 8soft_final_summercamp2011
Upcoming SlideShare
Loading in...5
×
 

Mobile security 8soft_final_summercamp2011

on

  • 1,195 views

 

Statistics

Views

Total Views
1,195
Views on SlideShare
1,195
Embed Views
0

Actions

Likes
0
Downloads
29
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as OpenOffice

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Mobile security 8soft_final_summercamp2011 Mobile security 8soft_final_summercamp2011 Presentation Transcript

  • Mobile Working With Z-Push & BES – What About Risks? Jens Fell
  • Statement No. 1 Smartphone OS are the unknown OS in business!
    • Apple iOS
    • bada, by Samsung (a version with Linux-Kernel)
    • BlackBerry, by RIM: proprietary system with push technology
    • Brew, by Qualcomm
    • Linux in various forms:
      • Android, by Open Handset Alliance (leadership by Google)
      • MeeGo, initiative by Nokia and Intel
      • Mobilinux, by MontaVista
      • Openmoko
      • webOS, by Palm
    • Symbian, administrated by Symbian Foundation
    • Windows Phone and Windows Mobile by Microsoft
  • Statement No. 2 Everything, that happens to a laptop, can happen to a smartphone, too!
  • Sources of Risk
    • Bluetooth
    • WiFi (W-LAN)
    • Camera
    • GPS
    • SMS/MMS
    • Email
    • Apps
    • Browser
  • Level of Risk
    • Abuse of corporate and private data by unauthorized access via device
        • e. g. access to social media identities, remote login, credit cards, .....
    • Loss of sensitive information
        • e. g. notes , pictures , scanned business cards
    • Attacks by mobile malware
        • e. g. data theft, extortion
    • Output of confidential data if the device is stolen, lost or spied
        • e. g. theft of intellectual property
    • Mobile Malware
    • Risk for mobile devices is rising
        • Number of signatures for mobile devices on 11 January 2011 -> 1834
        • Number of signatures for mobile devices on 07 June 2011 -> 2975
      Source: Kaspersky Lab January 2011
  • Mobile Malware
    • 154 families
    • 1046 modifications
    • In November 2010, 45 new changes were discovered.
    • Most common are SMS trojans.
      Source: Kaspersky Labs, January 2011
    • Examples for Mobile Malware
    • Trojan-SMS.AndroidOS.FakePlayer.a
    • Download: looks as if it was a media player
    • Sends SMS to a premium account for $ 5 for each SMS
    • What Does Mobile Malware Do?
    • Activate access to internet ( Backdoor.WinCE.Brador )
    • Stealthy sending of SMS/MMS with high fees ( Trojan-SMS.J2ME.RedBrowser )
    • Blocking functionalities of the mobile phone ( Trojan.SymbOS.Skuller, Rommwar )
    • Downloading of other viruses ( Trojan.SymbOS.Doombot mit ComWar )
    • Deleting data ( Trojan.SymbOS.Cardblock, Worm.MSIL.Cxover )
    • Theft of data ( Worm.SymbOS.StealWar, Trojan-Spy.SymbOS.Flexispy )
    • Using PCs for further circulation ( Worm.MSIL.Cxover )
    • A Typical Infection by Malware: Cabir
    • Large events with a huge amount of people (concerts, sports events, public transports)
    • User receives a file (mostly „sex.sis“) via bluetooth
    • The phone works but the battery discharges very fast (because Cabir uses bluetooth).
    • Virus removal :
      • Delete infected files
      • Operate a hard-reset or install firmware again
    • A Typical Infection by Malware: brador
    • Detects the IP address of the device and sends it via email to sender
    • If the phone is switched on, an agent starts to listen on port 2989 waiting for:
        • File sending / receiving
        • Execute file
        • Show folder content
        • Other commands
    • Virus removal :
      • Delete infected files
      • Operate a hard-reset or install firmware again
    • A Typical Infection by Malware: PBStealer
    • Looks like a „Phonebook Explorer “
    • (tool for optimizing the phonebook)
    • First seen in a Chinese forum
    • Sends a file with personal data of the user to all devices in range of coverage via bluetooth
    • Virus removal :
      • Delete infected files
      • Operate a hard-reset or install firmware again
    • A Typical Infection by Malware: CardBlock
    • Is downloaded as „InstantSiS“ (tool for transferring and exchanging SiS-files)
    • Blocks memory card with a random password
    • Damages all user applications
    • Deletes SMS and MMS messages
    • By deleting the infected files, the infection itself will not be eliminated.
    • The phone needs to be reset. Attention: All data on the smart card will be lost!
  • What Happens, When a Smartphone Gets Lost?
    • More than 250,000 mobile devices get lost at US airports. (Source: The Wisconsin Technology Network)
    • About 100,000 mobile devices are found in London's Underground.
    • Not less than one quarter of all mobile phones of a company contains confidential corporate data. (Source: BPMF)
    • 30 % of all mobile devices get lost every year. (Source: SANS-Institut)
    • 2/3 of all German companies have experiences with lost smartphones. (Source: Impulse Oct. 2010)
    • Each device that can not be retrieved causes costs of $ 2,500 because of the lost data. (Source: Gartner)
    • Companies with more than 5,000 employees could save up to $ 500,000 per year by tracking their devices. (Source: Gartner)
  • Risk Awareness For Smartphone Usage
    • Business use of mobile devices
      • 73% of all people using a smartphone don't know about the risks the device causes. (Source: National Cyber Security Alliance)
  • „ What Mobile Threats Are You Concerned With on Employees Smartphones?“
  • Maßnahmen zur Bedrohungsabwehr
    • organisatorische Maßnahmen
      • Schulung der Mitarbeiter
      • Unternehmens-Policy
      • Security-Policy
    • technische Maßnahmen
      • Zentrale Verwaltung
      • Verschlüsselung
      • Security für Smartphones nutzen
    • Kaspersky Mobile Security Enterprise Edition
  • Functions Operating System: Anti Theft + + + (+) Anti Virus + + - (+) Encryption + + - (-) Anti Spam + + + (+) Privacy Protection + + + (+)
  • Kaspersky Mobile Security
    • Retail / Enterprise
    • Functions
      • Encryptions protects against theft and virus
      • Remote roll out „over the air“ via management tool (own or third party provider) is possible
      • Extensive settings and limitations – via Kaspersky Administration Kit, Sybase Afaria or Microsoft System Center Mobile Device Manager
    • Supports established smartphone platforms :
      • Nokia, Black Berry, Windows Mobile and Android
  • How Does Kaspersky Endpoint Security for Smartphones Protect Mobile Users?
    • Anti Theft: Remote smartphone lock, wipe and GPS tracking – in the event that the device is lost or stolen
    • SIM Watch: Even if the thief changes the SIM card – all the remote functionality remains intact and the new phone number is sent to the real owner
    • Encryption: Files, folders and memory cards can be encrypted and access to them can be protected by password
    • Anti Virus: Real time protection, on-demand and scheduled scans, automatic „over the air“ anti virus data base updates
    • Anti Spam for calls & SMS: Unwanted calls and messages can easily be filtered out
    • Privacy Protection: For hiding communication histories with particular contacts, including contact book entries, call logs and SMS
    • Remote Administration: Smooth roll out to multiple devices without user involvement or disturbance
  • Questions ? Jens Fell 8Soft GmbH Phone : +49 931/250993-22 Email : [email_address] Visit our booth at Zarafa SummerCamp!