The inexorable cyber hackers are always on the hunt for their next big coup, and now the next target seems to be that small rock in the pocket called ‘smartphone’. This small rock has become the universe and hope it doesn’t end up being the graveyard for all.
As the number of mobile devices are soaring high so is finding the weakest link in the chain also increasing. What threats to mobile are most trending? Check out in this presentation.
2. The inexorable cyber
hackers are always on the
hunt for their next big coup,
and now the next target
seems to be that small rock
in the pocket called
‘smartphone’.
Introduction
3. This ‘small rock’ has become the universe and hope it
doesn’t end up being the graveyard for all.
4. “Every passing minute, we are witnessing about half a million attack attempts that are
happening in cyberspace.” says Derek Manky, Fortinet global security strategist.
5. As the number of mobile devices
are soaring high...
...so is finding the weakest
link in the chain.
6.
7. 1. Apps That Dig Corporate Information
Enterprises face a huge threat from
the apps that dig corporate
information beyond realization.
Employees give away confidential,
personal and corporate information
to these apps without thinking twice.
8. The data can be sent to remote servers
and other advertising networks, which
are easily accessible to the cyber
criminals.
They can be mined by the hostile
governments seeking access to
confidential corporate information via
hacking their networks.
How do they attack you?
1. Apps That Dig Corporate Information
9. Did you know?
Gartner says: By 2017, 75% of the attacks would be via apps
and not through critical technical attacks on the OS.
10. Mobile payment is no more a new term,
with this endless advantages of being
lucid and user friendly and on the go
mobile cash, there are severe risks
associated with this system as well.
2. Mobile Payment Services
11. The black hat hackers will not do it by
breaching the payment processing
algorithms, but via analysis of the
entire payment workflow, and figure
out the loophole.
2. Mobile Payment Services
How do they attack you?
12. They will identify the bypass
measures and vulnerabilities,
mostly leading to credit card
information fraud, unauthorized
use and extortion.
13. 3. Infected Mobile Devices
An infected mobile device allows
the cyber criminals to easily
breach an organization’s
perimeter and directly attack all
the devices on that particular
network.
14. 3. Infected Mobile Devices
If the hacker manages to infect a mobile
device and take control over it, he can take
two paths.
Either he chooses the traditional path of
stealing his contacts and sending texts,
or if the device is connected to a WiFi, he
can attack the additional systems on that
network.
How do they attack you?
15. 4. Mobile Phishing
There has been a volcanic
eruption of mobile devices and it
seems no one is able to save
themselves from the surge of its
magma.
Most of these handsets have preloaded
applications, and validation negligence can
lead to remote device hijacking.
16. 4. Mobile Phishing
New smartphone owners are
not used to the security
concerns and may connect
to unsecured AP/Wifi
connections.
These connections don’t encrypt data
communicating through that network and will
lead to rise in man in the middle attack.
How do they attack you?
17. This results in…
Severe data leakage like user
credentials, etc., through
insecure apps which the hackers
can eavesdrop, over a period of
time.
18. Mobile based browser hacking is one
of the most efficient ways to
compromise the entire mobile device.
5. Mobile Web Based Hacking
19. Exploiting the browser vulnerability
enables the hacker to bypass myriad
system level security measures.
Like WebKit based exploits enables
the hacker to bypass a browser’s
sandbox followed by OS exploits to
access the crux of the system and gain
full control over the device.
5. Mobile Web Based Hacking
How do they attack you?
20. 6. Malware Progression
Malware has a clear progression
these days. They start with indulging
the unsuspecting users who are
more viable to open, unknown
attachments, or install not known
applications and harness the user’s
crucial information from that.
21. 6. Malware Progression
Hackers use malicious apps to
send premium SMS or other
lucrative offers, getting the
users to install the malicious
app, and then the malware
starts hunting for the bank
credentials.
How do they attack you?
22. The SlemBunk attack is one of the
glaring examples of this type of
attack. And these attacks time and
again ensure that your mobile
device needs a complete security
solution sooner than later.
23. THE ENEMY IS US… despite 24*7 reliance on mobile phone we don’t seem to get any smarter.
Experts agree that malware and mobile attacks will keep on increasing as more and more people keep packing their phones with rich
and sensitive data.
Conclusion
THE ENEMY IS US… despite 24*7
reliance on mobile phone we don’t
seem to get any smarter.
Experts agree that malware and
mobile attacks will keep on
increasing as more and more people
keep packing their phones with rich
and sensitive data.
24. Official Blog Link -
https://mobileappninjas.wordpress.com/2016/03/15/top-
mobile-security-threats/
Mail us at: sales@algoworks.com
Contact us at: +1-877-284-1028
THANK YOU