SlideShare a Scribd company logo
CELLPHONE VIRUS AND
BY
SECURITY
HIMANSHU KUMAR
REG.NO:-U11CS056
INTRODUCTION

2
Smart Phones ‘R Pocket
Computers

 Most commonly used phones, as defined

by operating system (OS) –
 Android (Android OS)
 BlackBerry (RIM OS)
 iPhones / iPod touch (iPhone OS)
 PalmPre (WebOS)
 Windows Mobile (WinMobile OS)

3
Current threats by mobile malware


For financial gain / loss









Unnecessary calls / SMS / MMS
Send and sell private information

Cause phones to work slowly or crash
Wipe out contact books and other information on
the phone
Install “false” applications
Internet, Bluetooth, and MMS
 In all of these transfer methods, the user has

to agree at least once to run the infected file
 But smart phone virus writters get you to
open and install their product the same way
computer virus writers do:
 The virus is typically disguised as a game,
security patch or other desirable application

5
Viruses and Smart Phones
 How smart phone viruses spread –
 Internet downloads
 Bluetooth
 Multimedia Messaging System (MMS)

 Only smart phones susceptible to viruses
 Phones that can only make and receive calls are
not at risk

6
HISTORY
iPhone SMS attack first took place in July 2009
We trust smart phones & think they are safe
We have the mistaken sense they are immune to security
threats
Smart phones typically lack security features, like antivirus,
found on other computers

7
Classification of
Mobile Viruses
Classification
Behaviour

Virus

Worm

Trojan

Environment

Operating System

Vulnerable Application

:secrL yksr eps a K
ba uo S

Classification (examples)

Mobile Worms and Viruses

31st October 2006
Case Studies
Case Study – CABIR
First mobile worm

Spread vector – Bluetooth

Infected file – caribe.sis

15 new variants exist

Case Study - ComWar
Second landmark in mobile worms

Spread vector - Bluetooth and MMS

Large spread area due to MMS

Not as proof of concept – Intention to harm by
charging the mobile user

Multiple variants detected

Case Study - CardTrap
First cross-over mobile virus found

Can migrate from mobile to PC

Propogates as infected mobile application as well
as Windows worm

2 variants found

Protective Measures
Securing against attacks
System level security

MOSES

Network Level Security

Proactive approach

Lock Down Bluetooth!
 Bluetooth is default-on
 Wastes your battery
 Leaves you open to Bluetooth-based attacks

– most common at this time

17
Secure an iPhone
 Auto-Lock locks the touch screen for a preset

time period after not being used for one, two,
three, four or five minutes. Turned on by
default but can be disabled altogether
 Password-protect the SIM card on a 3G
 The Erase Data function lets you completely
wipe your iPhone after 10 failed passcode
attempts

18
Social Engineering Threats
 The best security in the world will not help

you if –
 You click on an phishing email and give your
personal information
 You click on a SMS/text message that
appears to come from your carrier
 You respond to a vishing phone call*
 Never give information via email or by phone
or on the web, unless you initiate the
exchange

19
Threats to Smart Phones
 Attackers will exploit our social conditioning

entering Personally Identifiable Information
(PI/PII), while interacting with phone voice
response to commit vishing and identity theft.1

 We demand more and better availability from

phone service than we would from an ISP, “so
the threat of a DoS attack might compel
carriers to pay out on a blackmail scam.”1

 “At this point, mobile device capability is far

ahead of security… We’ll start to see the botnet
problem infiltrate the mobile world in 2012.”2
20

More Related Content

What's hot

Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
CAS
 
Mobile security
Mobile securityMobile security
Mobile security
Naveen Kumar
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
Jimmy Shah
 
Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile network
RAVITEJA828
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
Lookout
 
9. cellphone hardening (cyber awareness series)
9. cellphone hardening (cyber awareness series)9. cellphone hardening (cyber awareness series)
9. cellphone hardening (cyber awareness series)
Isaac Feliciano
 
Mobile security
Mobile securityMobile security
Mobile security
home
 
Cyber security
Cyber securityCyber security
Cyber security
SanthoshKumar2614
 
Authentication service security
Authentication service securityAuthentication service security
Authentication service security
G Prachi
 
Why you need antivirus protection on your smartphone
Why you need antivirus protection on your smartphoneWhy you need antivirus protection on your smartphone
Why you need antivirus protection on your smartphone
Brian Gongol
 
Mobile security
Mobile securityMobile security
Mobile security
dilipdubey5
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
preetpatel72
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
Geo Marian
 
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Svetlin Nakov
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You Think
Blue Coat
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
Lisa Herrera
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
Manish Gupta
 
Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)
Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)
Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)
Svetlin Nakov
 
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
Commonwealth Telecommunications Organisation
 
Mobile security
Mobile security Mobile security
Mobile security
Himmatsingh Rajpurohit
 

What's hot (20)

Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
 
Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile network
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
9. cellphone hardening (cyber awareness series)
9. cellphone hardening (cyber awareness series)9. cellphone hardening (cyber awareness series)
9. cellphone hardening (cyber awareness series)
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Authentication service security
Authentication service securityAuthentication service security
Authentication service security
 
Why you need antivirus protection on your smartphone
Why you need antivirus protection on your smartphoneWhy you need antivirus protection on your smartphone
Why you need antivirus protection on your smartphone
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You Think
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 
Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)
Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)
Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)
 
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
 
Mobile security
Mobile security Mobile security
Mobile security
 

Similar to Him

Cp3201 mobile security final
Cp3201 mobile security finalCp3201 mobile security final
Cp3201 mobile security final
FinTech startup in stealth mode
 
Smartphone
SmartphoneSmartphone
Smartphone
Naval OPSEC
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
manish kumar
 
16 tips to thwart mobile security threats
16 tips to thwart mobile security threats16 tips to thwart mobile security threats
16 tips to thwart mobile security threats
John Gibson
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
tapan_sengupta
 
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxmobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
vrandmandora1
 
MOBILE SECURITY.pptx
MOBILE SECURITY.pptxMOBILE SECURITY.pptx
MOBILE SECURITY.pptx
KakshaPatel3
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
Ali J
 
Top 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOSTop 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOS
Innovation Network Technologies: InNet
 
Mobile Malware
Mobile MalwareMobile Malware
Mobile Malware
Martin Holovský
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
Ajay Singh
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobiles
Bee_Ware
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
Peter Wood
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
iYogi
 
CyberCrime attacks on Small Businesses
CyberCrime attacks on Small BusinessesCyberCrime attacks on Small Businesses
CyberCrime attacks on Small Businesses
Jose L. Quiñones-Borrero
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
Imaging Network Technology, LLC
 
Attacks on Mobile Devices by Nitish.pptx
Attacks on Mobile Devices by Nitish.pptxAttacks on Mobile Devices by Nitish.pptx
Attacks on Mobile Devices by Nitish.pptx
NitishChoudhary23
 
M
MM
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
acijjournal
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
ijsrd.com
 

Similar to Him (20)

Cp3201 mobile security final
Cp3201 mobile security finalCp3201 mobile security final
Cp3201 mobile security final
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
16 tips to thwart mobile security threats
16 tips to thwart mobile security threats16 tips to thwart mobile security threats
16 tips to thwart mobile security threats
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxmobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
 
MOBILE SECURITY.pptx
MOBILE SECURITY.pptxMOBILE SECURITY.pptx
MOBILE SECURITY.pptx
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
 
Top 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOSTop 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOS
 
Mobile Malware
Mobile MalwareMobile Malware
Mobile Malware
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobiles
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
CyberCrime attacks on Small Businesses
CyberCrime attacks on Small BusinessesCyberCrime attacks on Small Businesses
CyberCrime attacks on Small Businesses
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
Attacks on Mobile Devices by Nitish.pptx
Attacks on Mobile Devices by Nitish.pptxAttacks on Mobile Devices by Nitish.pptx
Attacks on Mobile Devices by Nitish.pptx
 
M
MM
M
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 

Recently uploaded

What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 

Recently uploaded (20)

What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 

Him

  • 3. Smart Phones ‘R Pocket Computers  Most commonly used phones, as defined by operating system (OS) –  Android (Android OS)  BlackBerry (RIM OS)  iPhones / iPod touch (iPhone OS)  PalmPre (WebOS)  Windows Mobile (WinMobile OS) 3
  • 4. Current threats by mobile malware  For financial gain / loss      Unnecessary calls / SMS / MMS Send and sell private information Cause phones to work slowly or crash Wipe out contact books and other information on the phone Install “false” applications
  • 5. Internet, Bluetooth, and MMS  In all of these transfer methods, the user has to agree at least once to run the infected file  But smart phone virus writters get you to open and install their product the same way computer virus writers do:  The virus is typically disguised as a game, security patch or other desirable application 5
  • 6. Viruses and Smart Phones  How smart phone viruses spread –  Internet downloads  Bluetooth  Multimedia Messaging System (MMS)  Only smart phones susceptible to viruses  Phones that can only make and receive calls are not at risk 6
  • 7. HISTORY iPhone SMS attack first took place in July 2009 We trust smart phones & think they are safe We have the mistaken sense they are immune to security threats Smart phones typically lack security features, like antivirus, found on other computers 7
  • 10. :secrL yksr eps a K ba uo S Classification (examples) Mobile Worms and Viruses 31st October 2006
  • 12. Case Study – CABIR First mobile worm  Spread vector – Bluetooth  Infected file – caribe.sis  15 new variants exist 
  • 13. Case Study - ComWar Second landmark in mobile worms  Spread vector - Bluetooth and MMS  Large spread area due to MMS  Not as proof of concept – Intention to harm by charging the mobile user  Multiple variants detected 
  • 14. Case Study - CardTrap First cross-over mobile virus found  Can migrate from mobile to PC  Propogates as infected mobile application as well as Windows worm  2 variants found 
  • 16. Securing against attacks System level security  MOSES  Network Level Security  Proactive approach 
  • 17. Lock Down Bluetooth!  Bluetooth is default-on  Wastes your battery  Leaves you open to Bluetooth-based attacks – most common at this time 17
  • 18. Secure an iPhone  Auto-Lock locks the touch screen for a preset time period after not being used for one, two, three, four or five minutes. Turned on by default but can be disabled altogether  Password-protect the SIM card on a 3G  The Erase Data function lets you completely wipe your iPhone after 10 failed passcode attempts 18
  • 19. Social Engineering Threats  The best security in the world will not help you if –  You click on an phishing email and give your personal information  You click on a SMS/text message that appears to come from your carrier  You respond to a vishing phone call*  Never give information via email or by phone or on the web, unless you initiate the exchange 19
  • 20. Threats to Smart Phones  Attackers will exploit our social conditioning entering Personally Identifiable Information (PI/PII), while interacting with phone voice response to commit vishing and identity theft.1  We demand more and better availability from phone service than we would from an ISP, “so the threat of a DoS attack might compel carriers to pay out on a blackmail scam.”1  “At this point, mobile device capability is far ahead of security… We’ll start to see the botnet problem infiltrate the mobile world in 2012.”2 20