SlideShare a Scribd company logo
If you haven’t heard…
the world has gone mobile.
Attackers follow opportunity
Credit: Google
Data has been leaking for a while
Credit: Forbes
 Account logins & passwords
Email
VPN
Social networks
Banking & shopping
 Services / resources
Internet & VPN
Cellular
sms (premium charges)
 Documents
Email & attachments
File storage services
 Monitoring
Microphone
Camera
GPS/location
Mobile Device Data & Assets
 Communications Networks
Cellular
WIFI
Bluetooth
NFC
 Malicious Apps
 Physical Access
USB
SIM
Dock/Accessory Connector
Lock screen
 Other
QR Code
Attack Surface
Type complex words here
No Thanks
Malicious Pokemon Go app
Source: infosecuritynews. 15 sept 2016
Malicious apps in google play store
Source: infosecurity news , 16 sept 2016
Fake Android apps
Credit: AndroidCentral.com
Fake apple apps
• Hosted on Apple/Google stores, missed by reviews
• Jailbreak markets
• Third-party app stores
• Enterprise app stores & app distribution services
Malicious App Sources
Android sandbox & security layers
Credit: Google
QuadRooter
• Vulnerability exposes 900M devices
• Affects Qualcomm chipsets from manufacturers ranging from HTC to LG
to OnePlus to Google, which contracts with other makers for its own
Nexus devices.
• It’s serious; compromised devices would give bad actors root access,
meaning they could collect any data stored on the phone, control the
camera and microphone, and track its GPS location.
Mitigations:
• Prefer vendors that patch!
• Android: disable installation from unknown sources
• Stick to trusted app sources/markets
Data Theft via Physical Access
Malicious USB Chargers (“Juice Jacking”)
• Free power charging station is really an exploit host
USB Debug Access
• Commercial phones with ADB debugging access on by default
• Blu Dash 4.5 (Android 4.2.1)
• HTC One (original Android 4.1.2)
• ADB debugging access gives you shell access
Mitigations:
• Android: turn off ADB debugging
• Newest IOS, Android prompt you to trust the USB
connection
• MAM, EMM, VDI, containers add extra layer of data
security
Data Theft via WiFi Networks
Non-Secure HTTP Traffic
• Mobile devices & apps sends lots of plaintext traffic
- This is all observable, subject to MITM
• Interesting data seen in the clear
- Android device ID
- IMEI
- GPS lat/long
• MITM attack vectors
- Android webview javascript callback
- IOS SSL verification error
Mitigations:
• Purge old prior networks from mobile device wifi list
- Security apps can automate this
- Android: Bluebox Wifi Cleaner
• Turn off radios (Bluetooth, Wifi) when not using them
- Bonus: saves battery!
- Android: Kismet Smarter Wi-Fi Manager
• Use device VPN & app VPNs to protect traffic on untrusted networks
- Some capabilities exclusive to MAM, EMM, and containers
Going Forward
Fact:
More vulnerabilities will
continue
Challenge:
keep data safe;
Quick detection and recovery
THANK YOU
YOGESH RAUT

More Related Content

What's hot

Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Ping Identity
 
Onboarding in the IoT
Onboarding in the IoTOnboarding in the IoT
Onboarding in the IoT
Paul Madsen
 
Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threatsgruzabb
 
Connecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldConnecting The Real World With The Virtual World
Connecting The Real World With The Virtual World
Ping Identity
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
chauhananand17
 
Identity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsIdentity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of Things
Ping Identity
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
Ping Identity
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
OWASP Delhi
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
ForgeRock
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT
ForgeRock
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
Vince Verbeke
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
Cigdem Sengul
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
ClicTest
 
CNIT 128 Ch 2: Hacking the cellular network
CNIT 128 Ch 2: Hacking the cellular networkCNIT 128 Ch 2: Hacking the cellular network
CNIT 128 Ch 2: Hacking the cellular network
Sam Bowne
 
Youtube videos might hijack your phone
Youtube videos might hijack your phoneYoutube videos might hijack your phone
Youtube videos might hijack your phone
niraj joshi
 
Managing Mobile Business Insecurities
Managing Mobile Business InsecuritiesManaging Mobile Business Insecurities
Managing Mobile Business Insecurities
Ping Identity
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the Enterprise
AirTight Networks
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
Leonardo De Moura Rocha Lima
 
IoT based on cyber security in defense industry and critical infrastructures
IoT based on cyber security in defense industry and critical infrastructuresIoT based on cyber security in defense industry and critical infrastructures
IoT based on cyber security in defense industry and critical infrastructures
UITSEC Teknoloji A.Ş.
 

What's hot (20)

Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
 
Onboarding in the IoT
Onboarding in the IoTOnboarding in the IoT
Onboarding in the IoT
 
Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threats
 
Connecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldConnecting The Real World With The Virtual World
Connecting The Real World With The Virtual World
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
 
Mobile security - Intense overview
Mobile security - Intense overviewMobile security - Intense overview
Mobile security - Intense overview
 
Identity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsIdentity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of Things
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
CNIT 128 Ch 2: Hacking the cellular network
CNIT 128 Ch 2: Hacking the cellular networkCNIT 128 Ch 2: Hacking the cellular network
CNIT 128 Ch 2: Hacking the cellular network
 
Youtube videos might hijack your phone
Youtube videos might hijack your phoneYoutube videos might hijack your phone
Youtube videos might hijack your phone
 
Managing Mobile Business Insecurities
Managing Mobile Business InsecuritiesManaging Mobile Business Insecurities
Managing Mobile Business Insecurities
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the Enterprise
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
 
IoT based on cyber security in defense industry and critical infrastructures
IoT based on cyber security in defense industry and critical infrastructuresIoT based on cyber security in defense industry and critical infrastructures
IoT based on cyber security in defense industry and critical infrastructures
 

Viewers also liked

EAN Partner Summit 2011: A theory of content strategy
EAN Partner Summit 2011: A theory of content strategyEAN Partner Summit 2011: A theory of content strategy
EAN Partner Summit 2011: A theory of content strategyExpedia Affiliate Network
 
MULTIMOT
MULTIMOTMULTIMOT
Bespak - Working with Business
Bespak - Working with BusinessBespak - Working with Business
Bespak - Working with Business
CANorfolk
 
Practical iOS App Security
Practical iOS App SecurityPractical iOS App Security
Practical iOS App Security
Totem_Training
 
09. traits of a trainer
09. traits of a trainer09. traits of a trainer
09. traits of a trainer
Abir Hossain
 
Addressing extremism
Addressing extremismAddressing extremism
Addressing extremism
Mark Levy
 
Science Through Technical Understanding
Science Through Technical UnderstandingScience Through Technical Understanding
Science Through Technical Understanding
hullpgce
 
090408 Modeling
090408 Modeling090408 Modeling
090408 Modeling
wonju jung
 
Predictive Analytics
Predictive AnalyticsPredictive Analytics
Predictive Analytics
Krisshhna Daasaarii
 
Transforming Lives in Partnership - Ilgun Yusuf
Transforming Lives in Partnership - Ilgun YusufTransforming Lives in Partnership - Ilgun Yusuf
Transforming Lives in Partnership - Ilgun Yusuf
CANorfolk
 
Research - Oral Presentation
Research - Oral PresentationResearch - Oral Presentation
Research - Oral PresentationKenya Joseph
 
Safeguarding training
Safeguarding trainingSafeguarding training
Safeguarding training
Andrew Hall
 
Assessing risk in sexting - FE
Assessing risk in sexting - FEAssessing risk in sexting - FE
Assessing risk in sexting - FE
Andrew Hall
 
Government Data Exchange and Open Government Data Platform
Government Data Exchange and Open Government Data PlatformGovernment Data Exchange and Open Government Data Platform
Government Data Exchange and Open Government Data Platform
Anveshi Gutta
 
Branding and communication
Branding and communication Branding and communication
Branding and communication
Abir Hossain
 
Ev681 session 1 sue
Ev681 session 1 sueEv681 session 1 sue
Ev681 session 1 sue
Pippa Totraku
 
Presentation brighton uni september 16 (3)
Presentation brighton uni september 16 (3)Presentation brighton uni september 16 (3)
Presentation brighton uni september 16 (3)
Pippa Totraku
 
Keeping Children Safe in Education 2016
Keeping Children Safe in Education 2016Keeping Children Safe in Education 2016
Keeping Children Safe in Education 2016
Andrew Hall
 
Safeguarding Children - Tallis CPD 2015
Safeguarding Children - Tallis CPD 2015Safeguarding Children - Tallis CPD 2015
Safeguarding Children - Tallis CPD 2015
Jon Nicholls
 
Streetscape & Urban Design Concept
Streetscape & Urban Design ConceptStreetscape & Urban Design Concept
Streetscape & Urban Design Concept
Walter Bone, RLA ASLA
 

Viewers also liked (20)

EAN Partner Summit 2011: A theory of content strategy
EAN Partner Summit 2011: A theory of content strategyEAN Partner Summit 2011: A theory of content strategy
EAN Partner Summit 2011: A theory of content strategy
 
MULTIMOT
MULTIMOTMULTIMOT
MULTIMOT
 
Bespak - Working with Business
Bespak - Working with BusinessBespak - Working with Business
Bespak - Working with Business
 
Practical iOS App Security
Practical iOS App SecurityPractical iOS App Security
Practical iOS App Security
 
09. traits of a trainer
09. traits of a trainer09. traits of a trainer
09. traits of a trainer
 
Addressing extremism
Addressing extremismAddressing extremism
Addressing extremism
 
Science Through Technical Understanding
Science Through Technical UnderstandingScience Through Technical Understanding
Science Through Technical Understanding
 
090408 Modeling
090408 Modeling090408 Modeling
090408 Modeling
 
Predictive Analytics
Predictive AnalyticsPredictive Analytics
Predictive Analytics
 
Transforming Lives in Partnership - Ilgun Yusuf
Transforming Lives in Partnership - Ilgun YusufTransforming Lives in Partnership - Ilgun Yusuf
Transforming Lives in Partnership - Ilgun Yusuf
 
Research - Oral Presentation
Research - Oral PresentationResearch - Oral Presentation
Research - Oral Presentation
 
Safeguarding training
Safeguarding trainingSafeguarding training
Safeguarding training
 
Assessing risk in sexting - FE
Assessing risk in sexting - FEAssessing risk in sexting - FE
Assessing risk in sexting - FE
 
Government Data Exchange and Open Government Data Platform
Government Data Exchange and Open Government Data PlatformGovernment Data Exchange and Open Government Data Platform
Government Data Exchange and Open Government Data Platform
 
Branding and communication
Branding and communication Branding and communication
Branding and communication
 
Ev681 session 1 sue
Ev681 session 1 sueEv681 session 1 sue
Ev681 session 1 sue
 
Presentation brighton uni september 16 (3)
Presentation brighton uni september 16 (3)Presentation brighton uni september 16 (3)
Presentation brighton uni september 16 (3)
 
Keeping Children Safe in Education 2016
Keeping Children Safe in Education 2016Keeping Children Safe in Education 2016
Keeping Children Safe in Education 2016
 
Safeguarding Children - Tallis CPD 2015
Safeguarding Children - Tallis CPD 2015Safeguarding Children - Tallis CPD 2015
Safeguarding Children - Tallis CPD 2015
 
Streetscape & Urban Design Concept
Streetscape & Urban Design ConceptStreetscape & Urban Design Concept
Streetscape & Urban Design Concept
 

Similar to ANDROID SECURITY

Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devicesjraja01
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectivePragati Rai
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
Michael Davis
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
Michael Davis
 
CNIT 128 5: Mobile malware
CNIT 128 5: Mobile malwareCNIT 128 5: Mobile malware
CNIT 128 5: Mobile malware
Sam Bowne
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
Blueinfy Solutions
 
17-Android.pptx
17-Android.pptx17-Android.pptx
17-Android.pptx
PRANAVKUMAR699137
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
Frank Siepmann
 
Android– forensics and security testing
Android– forensics and security testingAndroid– forensics and security testing
Android– forensics and security testing
Santhosh Kumar
 
Info security - mobile approach
Info security -  mobile approachInfo security -  mobile approach
Info security - mobile approach
EY Belgium
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?Tyler Shields
 
Secure mobile payment
Secure mobile paymentSecure mobile payment
Secure mobile payment
Ahmed Kamel Taha
 
Mobile security
Mobile securityMobile security
Mobile security
CyberoamAcademy
 
Earthmouse: Mobile Guardian
Earthmouse: Mobile GuardianEarthmouse: Mobile Guardian
Earthmouse: Mobile Guardian
earthmouse
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobiles
Bee_Ware
 
Intro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngIntro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web Designinng
I am Cipher
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
Peter Wood
 
Not another *$#@ app: How to avoid IoT fatigue
Not another *$#@ app: How to avoid IoT fatigueNot another *$#@ app: How to avoid IoT fatigue
Not another *$#@ app: How to avoid IoT fatigue
Ramin Firoozye
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
Andris Soroka
 
Fake Devices - Countering a Hidden and Growing Threat
Fake Devices - Countering a Hidden and Growing ThreatFake Devices - Countering a Hidden and Growing Threat
Fake Devices - Countering a Hidden and Growing Threat
DeviceAssure
 

Similar to ANDROID SECURITY (20)

Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devices
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
CNIT 128 5: Mobile malware
CNIT 128 5: Mobile malwareCNIT 128 5: Mobile malware
CNIT 128 5: Mobile malware
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
 
17-Android.pptx
17-Android.pptx17-Android.pptx
17-Android.pptx
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
Android– forensics and security testing
Android– forensics and security testingAndroid– forensics and security testing
Android– forensics and security testing
 
Info security - mobile approach
Info security -  mobile approachInfo security -  mobile approach
Info security - mobile approach
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
 
Secure mobile payment
Secure mobile paymentSecure mobile payment
Secure mobile payment
 
Mobile security
Mobile securityMobile security
Mobile security
 
Earthmouse: Mobile Guardian
Earthmouse: Mobile GuardianEarthmouse: Mobile Guardian
Earthmouse: Mobile Guardian
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobiles
 
Intro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngIntro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web Designinng
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Not another *$#@ app: How to avoid IoT fatigue
Not another *$#@ app: How to avoid IoT fatigueNot another *$#@ app: How to avoid IoT fatigue
Not another *$#@ app: How to avoid IoT fatigue
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
 
Fake Devices - Countering a Hidden and Growing Threat
Fake Devices - Countering a Hidden and Growing ThreatFake Devices - Countering a Hidden and Growing Threat
Fake Devices - Countering a Hidden and Growing Threat
 

Recently uploaded

Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 

Recently uploaded (20)

Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 

ANDROID SECURITY

  • 1. If you haven’t heard… the world has gone mobile.
  • 3. Data has been leaking for a while Credit: Forbes
  • 4.  Account logins & passwords Email VPN Social networks Banking & shopping  Services / resources Internet & VPN Cellular sms (premium charges)  Documents Email & attachments File storage services  Monitoring Microphone Camera GPS/location Mobile Device Data & Assets
  • 5.  Communications Networks Cellular WIFI Bluetooth NFC  Malicious Apps  Physical Access USB SIM Dock/Accessory Connector Lock screen  Other QR Code Attack Surface
  • 6. Type complex words here No Thanks
  • 7. Malicious Pokemon Go app Source: infosecuritynews. 15 sept 2016
  • 8. Malicious apps in google play store Source: infosecurity news , 16 sept 2016
  • 9. Fake Android apps Credit: AndroidCentral.com
  • 11. • Hosted on Apple/Google stores, missed by reviews • Jailbreak markets • Third-party app stores • Enterprise app stores & app distribution services Malicious App Sources
  • 12. Android sandbox & security layers Credit: Google
  • 13. QuadRooter • Vulnerability exposes 900M devices • Affects Qualcomm chipsets from manufacturers ranging from HTC to LG to OnePlus to Google, which contracts with other makers for its own Nexus devices. • It’s serious; compromised devices would give bad actors root access, meaning they could collect any data stored on the phone, control the camera and microphone, and track its GPS location.
  • 14. Mitigations: • Prefer vendors that patch! • Android: disable installation from unknown sources • Stick to trusted app sources/markets
  • 15. Data Theft via Physical Access Malicious USB Chargers (“Juice Jacking”) • Free power charging station is really an exploit host
  • 16. USB Debug Access • Commercial phones with ADB debugging access on by default • Blu Dash 4.5 (Android 4.2.1) • HTC One (original Android 4.1.2) • ADB debugging access gives you shell access
  • 17. Mitigations: • Android: turn off ADB debugging • Newest IOS, Android prompt you to trust the USB connection • MAM, EMM, VDI, containers add extra layer of data security
  • 18. Data Theft via WiFi Networks Non-Secure HTTP Traffic • Mobile devices & apps sends lots of plaintext traffic - This is all observable, subject to MITM • Interesting data seen in the clear - Android device ID - IMEI - GPS lat/long • MITM attack vectors - Android webview javascript callback - IOS SSL verification error
  • 19. Mitigations: • Purge old prior networks from mobile device wifi list - Security apps can automate this - Android: Bluebox Wifi Cleaner • Turn off radios (Bluetooth, Wifi) when not using them - Bonus: saves battery! - Android: Kismet Smarter Wi-Fi Manager • Use device VPN & app VPNs to protect traffic on untrusted networks - Some capabilities exclusive to MAM, EMM, and containers
  • 20. Going Forward Fact: More vulnerabilities will continue Challenge: keep data safe; Quick detection and recovery

Editor's Notes

  1. Researchers have discovered a rogue Pokémon Go app on the Google Play Store that has been downloaded over 500,000 times, and infected over 6,000 Android smartphones. The app, called Guide for Pokémon Go, can seize root access rights on Android devices and use that power to install and uninstall apps and display unwanted adverts. It was first discovered by researchers at Kaspersky Lab, who notified Google. The app has now been removed from the Play Store.
  2. This data includes: The user’s contacts, including name, phone number, email, and times contacted; all user accounts on a compromised device; precise location, including latitude, longitude, network ID, and location area code; free internal and external memory; Device IMEI, IMSI, MCC, MNC, phone type, network operator, device and Android information; and details of installed packages, Lookout researchers outlined in a blog.
  3. It’s like giving someone the keys to your house, then holding the door open for them while they make off with the jewels.
  4. Virtual desktop infrastructure (VDI) is the practice of hosting a desktop operating system within a virtual machine (VM) running on a centralized server. MDM MDM stands for mobile device management and consists of configuration and policy management tools that are implemented using application programming interfaces (APIs) released by mobile operating system providers such as Apple, Google and Microsoft to control and manage mobile devices. The typical functionality of an MDM software includes: Hardware and application inventory Configuration of security policies such as password policy, device encryption, WiFi settings, detection of jailbroken devices and so forth Execution of actions such as partial or remote wipe, remote lock, device location mapping and passcode clearing Access to self-service portals to enable users to protect personal and enterprise data MAM MAM stands for mobile application management software, which can apply policy controls to and provision mobile applications, both internally developed apps and apps that are commercially available in stores such as the Apple App Store and Google Play. MAM solutions usually have an enterprise app store that enables application control and delivery to mobile devices. MAM solutions provide control over mobile applications either through app wrapping or the use of a software development kit (SDK). EMM EMM stands for enterprise mobile management and typically consists of the following capabilities: Mobile device management Mobile application management Mobile content management Mobile content management products provide a secure container that enables enterprise data to be secured while preserving the mobile experience on the mobile device, whether it’s corporate supplied or employee owned. Users can access their email, contacts, calendars, apps, documents and web browsing from within the secure container installed on their mobile device.