SlideShare a Scribd company logo
1 of 24
THREATS
ENGULFING MOBILE
The inexorable cyber
hackers are always on the
hunt for their next big coup,
and now the next target
seems to be that small rock
in the pocket called
‘smartphone’.
Introduction
This ‘small rock’ has become the universe and hope it
doesn’t end up being the graveyard for all.
“Every passing minute, we are witnessing about half a million attack attempts that are
happening in cyberspace.” says Derek Manky, Fortinet global security strategist.
As the number of mobile devices
are soaring high...
...so is finding the weakest
link in the chain.
1. Apps That Dig Corporate Information
Enterprises face a huge threat from
the apps that dig corporate
information beyond realization.
Employees give away confidential,
personal and corporate information
to these apps without thinking twice.
The data can be sent to remote servers
and other advertising networks, which
are easily accessible to the cyber
criminals.
They can be mined by the hostile
governments seeking access to
confidential corporate information via
hacking their networks.
How do they attack you?
1. Apps That Dig Corporate Information
Did you know?
Gartner says: By 2017, 75% of the attacks would be via apps
and not through critical technical attacks on the OS.
Mobile payment is no more a new term,
with this endless advantages of being
lucid and user friendly and on the go
mobile cash, there are severe risks
associated with this system as well.
2. Mobile Payment Services
The black hat hackers will not do it by
breaching the payment processing
algorithms, but via analysis of the
entire payment workflow, and figure
out the loophole.
2. Mobile Payment Services
How do they attack you?
They will identify the bypass
measures and vulnerabilities,
mostly leading to credit card
information fraud, unauthorized
use and extortion.
3. Infected Mobile Devices
An infected mobile device allows
the cyber criminals to easily
breach an organization’s
perimeter and directly attack all
the devices on that particular
network.
3. Infected Mobile Devices
If the hacker manages to infect a mobile
device and take control over it, he can take
two paths.
Either he chooses the traditional path of
stealing his contacts and sending texts,
or if the device is connected to a WiFi, he
can attack the additional systems on that
network.
How do they attack you?
4. Mobile Phishing
There has been a volcanic
eruption of mobile devices and it
seems no one is able to save
themselves from the surge of its
magma.
Most of these handsets have preloaded
applications, and validation negligence can
lead to remote device hijacking.
4. Mobile Phishing
New smartphone owners are
not used to the security
concerns and may connect
to unsecured AP/Wifi
connections.
These connections don’t encrypt data
communicating through that network and will
lead to rise in man in the middle attack.
How do they attack you?
This results in…
Severe data leakage like user
credentials, etc., through
insecure apps which the hackers
can eavesdrop, over a period of
time.
Mobile based browser hacking is one
of the most efficient ways to
compromise the entire mobile device.
5. Mobile Web Based Hacking
Exploiting the browser vulnerability
enables the hacker to bypass myriad
system level security measures.
Like WebKit based exploits enables
the hacker to bypass a browser’s
sandbox followed by OS exploits to
access the crux of the system and gain
full control over the device.
5. Mobile Web Based Hacking
How do they attack you?
6. Malware Progression
Malware has a clear progression
these days. They start with indulging
the unsuspecting users who are
more viable to open, unknown
attachments, or install not known
applications and harness the user’s
crucial information from that.
6. Malware Progression
Hackers use malicious apps to
send premium SMS or other
lucrative offers, getting the
users to install the malicious
app, and then the malware
starts hunting for the bank
credentials.
How do they attack you?
The SlemBunk attack is one of the
glaring examples of this type of
attack. And these attacks time and
again ensure that your mobile
device needs a complete security
solution sooner than later.
THE ENEMY IS US… despite 24*7 reliance on mobile phone we don’t seem to get any smarter.
Experts agree that malware and mobile attacks will keep on increasing as more and more people keep packing their phones with rich
and sensitive data.
Conclusion
THE ENEMY IS US… despite 24*7
reliance on mobile phone we don’t
seem to get any smarter.
Experts agree that malware and
mobile attacks will keep on
increasing as more and more people
keep packing their phones with rich
and sensitive data.
Official Blog Link -
https://mobileappninjas.wordpress.com/2016/03/15/top-
mobile-security-threats/
Mail us at: sales@algoworks.com
Contact us at: +1-877-284-1028
THANK YOU

More Related Content

More from Ajeet Singh

Dreamforce 2022 - Algoworks.pptx
Dreamforce 2022 - Algoworks.pptxDreamforce 2022 - Algoworks.pptx
Dreamforce 2022 - Algoworks.pptxAjeet Singh
 
Why and When Enterprise Should Adopt NativeScript for App Development
Why and When Enterprise Should Adopt NativeScript for App DevelopmentWhy and When Enterprise Should Adopt NativeScript for App Development
Why and When Enterprise Should Adopt NativeScript for App DevelopmentAjeet Singh
 
The Next Big Thing In Mobile App Development – Trends 2019!
The Next Big Thing In Mobile App Development – Trends 2019!The Next Big Thing In Mobile App Development – Trends 2019!
The Next Big Thing In Mobile App Development – Trends 2019!Ajeet Singh
 
The Best Design Trend Is To Not Follow One. We have 6! : UI Design Trends 2019!
The Best Design Trend Is To Not Follow One. We have 6! : UI Design Trends 2019!The Best Design Trend Is To Not Follow One. We have 6! : UI Design Trends 2019!
The Best Design Trend Is To Not Follow One. We have 6! : UI Design Trends 2019!Ajeet Singh
 
5 Hottest Trends The DevOps World Wants You To Know!
5 Hottest Trends The DevOps World Wants You To Know!5 Hottest Trends The DevOps World Wants You To Know!
5 Hottest Trends The DevOps World Wants You To Know!Ajeet Singh
 
[Business Strategy] Pump Up Your Revenue: Retain Customers With Salesforce!
[Business Strategy] Pump Up Your Revenue: Retain Customers With Salesforce![Business Strategy] Pump Up Your Revenue: Retain Customers With Salesforce!
[Business Strategy] Pump Up Your Revenue: Retain Customers With Salesforce!Ajeet Singh
 
Happening Dreamforce Parties 2018 | Dreamforce 2018 Countdown Is On. Are You ...
Happening Dreamforce Parties 2018 | Dreamforce 2018 Countdown Is On. Are You ...Happening Dreamforce Parties 2018 | Dreamforce 2018 Countdown Is On. Are You ...
Happening Dreamforce Parties 2018 | Dreamforce 2018 Countdown Is On. Are You ...Ajeet Singh
 
DevSecOps: Integrating Security Into DevOps! {Business Security}
DevSecOps: Integrating Security Into DevOps! {Business Security}DevSecOps: Integrating Security Into DevOps! {Business Security}
DevSecOps: Integrating Security Into DevOps! {Business Security}Ajeet Singh
 
[Business Strategy] DevOps Implementation Failure. Save It Before You Fail It!
[Business Strategy] DevOps Implementation Failure. Save It Before You Fail It![Business Strategy] DevOps Implementation Failure. Save It Before You Fail It!
[Business Strategy] DevOps Implementation Failure. Save It Before You Fail It!Ajeet Singh
 
DevOps & Its Impact | An Infographic
DevOps & Its Impact | An InfographicDevOps & Its Impact | An Infographic
DevOps & Its Impact | An InfographicAjeet Singh
 
Top 6 Upcoming Big Data Trends of 2018!
Top 6 Upcoming Big Data Trends of 2018!Top 6 Upcoming Big Data Trends of 2018!
Top 6 Upcoming Big Data Trends of 2018!Ajeet Singh
 
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...Ajeet Singh
 
10 top notch big data trends to watch out for in 2017
10 top notch big data trends to watch out for in 201710 top notch big data trends to watch out for in 2017
10 top notch big data trends to watch out for in 2017Ajeet Singh
 
Native WebRTC Mobile App Development: Tools & Tips
Native WebRTC Mobile App Development: Tools & TipsNative WebRTC Mobile App Development: Tools & Tips
Native WebRTC Mobile App Development: Tools & TipsAjeet Singh
 
The Mobile Grenade | An Infographic
The Mobile Grenade | An InfographicThe Mobile Grenade | An Infographic
The Mobile Grenade | An InfographicAjeet Singh
 
The Mobile Story 2016 [Infographic]
The Mobile Story 2016 [Infographic]The Mobile Story 2016 [Infographic]
The Mobile Story 2016 [Infographic]Ajeet Singh
 
Mobile Retail and You | An Infographic
Mobile Retail and You | An InfographicMobile Retail and You | An Infographic
Mobile Retail and You | An InfographicAjeet Singh
 
Mobile Marketing Mania [Infographic]
Mobile Marketing Mania [Infographic]Mobile Marketing Mania [Infographic]
Mobile Marketing Mania [Infographic]Ajeet Singh
 
Dreamforce 2016 : Highlights, Hacks and Rumors
Dreamforce 2016 : Highlights, Hacks and RumorsDreamforce 2016 : Highlights, Hacks and Rumors
Dreamforce 2016 : Highlights, Hacks and RumorsAjeet Singh
 
Advantage Dreamforce: In Numbers | An Infographic
Advantage Dreamforce: In Numbers | An InfographicAdvantage Dreamforce: In Numbers | An Infographic
Advantage Dreamforce: In Numbers | An InfographicAjeet Singh
 

More from Ajeet Singh (20)

Dreamforce 2022 - Algoworks.pptx
Dreamforce 2022 - Algoworks.pptxDreamforce 2022 - Algoworks.pptx
Dreamforce 2022 - Algoworks.pptx
 
Why and When Enterprise Should Adopt NativeScript for App Development
Why and When Enterprise Should Adopt NativeScript for App DevelopmentWhy and When Enterprise Should Adopt NativeScript for App Development
Why and When Enterprise Should Adopt NativeScript for App Development
 
The Next Big Thing In Mobile App Development – Trends 2019!
The Next Big Thing In Mobile App Development – Trends 2019!The Next Big Thing In Mobile App Development – Trends 2019!
The Next Big Thing In Mobile App Development – Trends 2019!
 
The Best Design Trend Is To Not Follow One. We have 6! : UI Design Trends 2019!
The Best Design Trend Is To Not Follow One. We have 6! : UI Design Trends 2019!The Best Design Trend Is To Not Follow One. We have 6! : UI Design Trends 2019!
The Best Design Trend Is To Not Follow One. We have 6! : UI Design Trends 2019!
 
5 Hottest Trends The DevOps World Wants You To Know!
5 Hottest Trends The DevOps World Wants You To Know!5 Hottest Trends The DevOps World Wants You To Know!
5 Hottest Trends The DevOps World Wants You To Know!
 
[Business Strategy] Pump Up Your Revenue: Retain Customers With Salesforce!
[Business Strategy] Pump Up Your Revenue: Retain Customers With Salesforce![Business Strategy] Pump Up Your Revenue: Retain Customers With Salesforce!
[Business Strategy] Pump Up Your Revenue: Retain Customers With Salesforce!
 
Happening Dreamforce Parties 2018 | Dreamforce 2018 Countdown Is On. Are You ...
Happening Dreamforce Parties 2018 | Dreamforce 2018 Countdown Is On. Are You ...Happening Dreamforce Parties 2018 | Dreamforce 2018 Countdown Is On. Are You ...
Happening Dreamforce Parties 2018 | Dreamforce 2018 Countdown Is On. Are You ...
 
DevSecOps: Integrating Security Into DevOps! {Business Security}
DevSecOps: Integrating Security Into DevOps! {Business Security}DevSecOps: Integrating Security Into DevOps! {Business Security}
DevSecOps: Integrating Security Into DevOps! {Business Security}
 
[Business Strategy] DevOps Implementation Failure. Save It Before You Fail It!
[Business Strategy] DevOps Implementation Failure. Save It Before You Fail It![Business Strategy] DevOps Implementation Failure. Save It Before You Fail It!
[Business Strategy] DevOps Implementation Failure. Save It Before You Fail It!
 
DevOps & Its Impact | An Infographic
DevOps & Its Impact | An InfographicDevOps & Its Impact | An Infographic
DevOps & Its Impact | An Infographic
 
Top 6 Upcoming Big Data Trends of 2018!
Top 6 Upcoming Big Data Trends of 2018!Top 6 Upcoming Big Data Trends of 2018!
Top 6 Upcoming Big Data Trends of 2018!
 
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
 
10 top notch big data trends to watch out for in 2017
10 top notch big data trends to watch out for in 201710 top notch big data trends to watch out for in 2017
10 top notch big data trends to watch out for in 2017
 
Native WebRTC Mobile App Development: Tools & Tips
Native WebRTC Mobile App Development: Tools & TipsNative WebRTC Mobile App Development: Tools & Tips
Native WebRTC Mobile App Development: Tools & Tips
 
The Mobile Grenade | An Infographic
The Mobile Grenade | An InfographicThe Mobile Grenade | An Infographic
The Mobile Grenade | An Infographic
 
The Mobile Story 2016 [Infographic]
The Mobile Story 2016 [Infographic]The Mobile Story 2016 [Infographic]
The Mobile Story 2016 [Infographic]
 
Mobile Retail and You | An Infographic
Mobile Retail and You | An InfographicMobile Retail and You | An Infographic
Mobile Retail and You | An Infographic
 
Mobile Marketing Mania [Infographic]
Mobile Marketing Mania [Infographic]Mobile Marketing Mania [Infographic]
Mobile Marketing Mania [Infographic]
 
Dreamforce 2016 : Highlights, Hacks and Rumors
Dreamforce 2016 : Highlights, Hacks and RumorsDreamforce 2016 : Highlights, Hacks and Rumors
Dreamforce 2016 : Highlights, Hacks and Rumors
 
Advantage Dreamforce: In Numbers | An Infographic
Advantage Dreamforce: In Numbers | An InfographicAdvantage Dreamforce: In Numbers | An Infographic
Advantage Dreamforce: In Numbers | An Infographic
 

Recently uploaded

Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Pooja Nehwal
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceanilsa9823
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceanilsa9823
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7Pooja Nehwal
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRnishacall1
 

Recently uploaded (7)

Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
 

6 Security Threats Engulfing Mobile

  • 2. The inexorable cyber hackers are always on the hunt for their next big coup, and now the next target seems to be that small rock in the pocket called ‘smartphone’. Introduction
  • 3. This ‘small rock’ has become the universe and hope it doesn’t end up being the graveyard for all.
  • 4. “Every passing minute, we are witnessing about half a million attack attempts that are happening in cyberspace.” says Derek Manky, Fortinet global security strategist.
  • 5. As the number of mobile devices are soaring high... ...so is finding the weakest link in the chain.
  • 6.
  • 7. 1. Apps That Dig Corporate Information Enterprises face a huge threat from the apps that dig corporate information beyond realization. Employees give away confidential, personal and corporate information to these apps without thinking twice.
  • 8. The data can be sent to remote servers and other advertising networks, which are easily accessible to the cyber criminals. They can be mined by the hostile governments seeking access to confidential corporate information via hacking their networks. How do they attack you? 1. Apps That Dig Corporate Information
  • 9. Did you know? Gartner says: By 2017, 75% of the attacks would be via apps and not through critical technical attacks on the OS.
  • 10. Mobile payment is no more a new term, with this endless advantages of being lucid and user friendly and on the go mobile cash, there are severe risks associated with this system as well. 2. Mobile Payment Services
  • 11. The black hat hackers will not do it by breaching the payment processing algorithms, but via analysis of the entire payment workflow, and figure out the loophole. 2. Mobile Payment Services How do they attack you?
  • 12. They will identify the bypass measures and vulnerabilities, mostly leading to credit card information fraud, unauthorized use and extortion.
  • 13. 3. Infected Mobile Devices An infected mobile device allows the cyber criminals to easily breach an organization’s perimeter and directly attack all the devices on that particular network.
  • 14. 3. Infected Mobile Devices If the hacker manages to infect a mobile device and take control over it, he can take two paths. Either he chooses the traditional path of stealing his contacts and sending texts, or if the device is connected to a WiFi, he can attack the additional systems on that network. How do they attack you?
  • 15. 4. Mobile Phishing There has been a volcanic eruption of mobile devices and it seems no one is able to save themselves from the surge of its magma. Most of these handsets have preloaded applications, and validation negligence can lead to remote device hijacking.
  • 16. 4. Mobile Phishing New smartphone owners are not used to the security concerns and may connect to unsecured AP/Wifi connections. These connections don’t encrypt data communicating through that network and will lead to rise in man in the middle attack. How do they attack you?
  • 17. This results in… Severe data leakage like user credentials, etc., through insecure apps which the hackers can eavesdrop, over a period of time.
  • 18. Mobile based browser hacking is one of the most efficient ways to compromise the entire mobile device. 5. Mobile Web Based Hacking
  • 19. Exploiting the browser vulnerability enables the hacker to bypass myriad system level security measures. Like WebKit based exploits enables the hacker to bypass a browser’s sandbox followed by OS exploits to access the crux of the system and gain full control over the device. 5. Mobile Web Based Hacking How do they attack you?
  • 20. 6. Malware Progression Malware has a clear progression these days. They start with indulging the unsuspecting users who are more viable to open, unknown attachments, or install not known applications and harness the user’s crucial information from that.
  • 21. 6. Malware Progression Hackers use malicious apps to send premium SMS or other lucrative offers, getting the users to install the malicious app, and then the malware starts hunting for the bank credentials. How do they attack you?
  • 22. The SlemBunk attack is one of the glaring examples of this type of attack. And these attacks time and again ensure that your mobile device needs a complete security solution sooner than later.
  • 23. THE ENEMY IS US… despite 24*7 reliance on mobile phone we don’t seem to get any smarter. Experts agree that malware and mobile attacks will keep on increasing as more and more people keep packing their phones with rich and sensitive data. Conclusion THE ENEMY IS US… despite 24*7 reliance on mobile phone we don’t seem to get any smarter. Experts agree that malware and mobile attacks will keep on increasing as more and more people keep packing their phones with rich and sensitive data.
  • 24. Official Blog Link - https://mobileappninjas.wordpress.com/2016/03/15/top- mobile-security-threats/ Mail us at: sales@algoworks.com Contact us at: +1-877-284-1028 THANK YOU