Mobile Computing Threats

  Exposure, Exploit and Opportunity = Attack
             David Michael Perry
Global Director of Education – Trend Micro, Inc.
EVERY YEAR
•   Systems are more powerful
•   Systems are faster
•   Systems are smaller
•   Systems are more connected
•   Systems are more mobile
•   Systems are victims
This is NOT the problem
                                                                                                                   = Symbian OS (Nokia, etc)
                                                                                                                   = Windows Mobile (HP iPAQ, etc)

20June0        21Nov04             8Mar05                                                                          = Java (J2ME)
                                                    15Apr05
   4
 Cabir          Skulls             Dampig           Hobbes                                                                                  11Jul07     28Feb08
                                            4Apr05                      19Jul05                                                             Flexspy      Hathat
                         1Feb05                                                       23Nov05                      4Sep06       10Mar0
                                            Mabir                                                     30Mar06                                                  5Mar08
                                                                     Cadmesk                                                      7                 4Feb08
     5Aug04                                                                           PBSteal                       Acallno     Feakks
                         Locknut                                                                      Flexspy                                                   Dropper
                                                              8Jul05                                                                                Smsany
    Win CE               (Gavno)                                              21Sep05       28Feb06
    BRADO                                                                                                   18Jun0       14Nov06       21May0
                                                              Boottoo         Cardtrp       RedBrow
      R                                                                                                        6
                                                                                                            Romride      Comdrop          7
                                                                                                                                        Viver
                                                                n




                                                         Doomed                                                                                        Fonzi       Kiazha
                                                                                                        OneJump       Wesber       Feaks
            Qdial             Comwar                     4Jul05                          Sndtool                                                      28Feb08
                                             Fontal                                                                               10Mar07                          5Mar08
                              7Mar05                                        Blanfon                       3Apr06      7Sep06
                                                                                          23Jan06
          12Aug04                               6Apr05                                                                                    Mpofeli
                                                                            10Aug05                                                                     Infojack
                    Vlasco             Drever                  Skudoo                                                                    12Jun07
                                                                                                 Cxover                       Mrex                      29Feb08
   Win CE                                                         19Jul05
                    29Dec04            18Mar05                                                                                1Dec06               Beselo
   DUTS                                                                           Cardblk        15Mar06
                                                                                                                Mobler
  17Jul04                                                                         2Oct05                        31Aug06                          23Jan08



      2004                                          2005                                        2006                             2007                       2008
   Note: Chart includes new malware strains, does not include variants
This is part of the problem
This is a BIGGER PART of the problem




Source: Argonne National Laboratory, Nuclear Engineering Division,
Vulnerability Assessment Team (VAT)
http://www.ne.anl.gov/capabilities/vat/seals/maxims.html
The data is moving into mobile, as is 
                    the connectivity
The main advantage in mobile
Threats To Enterprise Devices
Compromised data at rest
 Compromised Data
      Countermeasures
        –Encryption
       –Authentication
          –Firewall
     Compromised data
        in motion          Impaired Productivity
                              Block hacking, intrusions,
                                 Countermeasures
     Countermeasures
                                       malware
                                   –Firewall/IDS
        –SSL/VPN
                              –Antivirus/anti-spyware
The Problem
• Information (DATA)  is property
• YOUR DATA is out in the world, in mobile 
  devices, out of your protection and control
• New threats always arise suiting the newest 
  medium of information exchange.
• Social Networks
• There are bad guys out there.
And yet, the process accelerates
There is a light at the end of the 
              tunnel
Think mobile devices are safe?
              Think again!




To find out more about protecting mobile devices go to www.trendmicro.com

Mobile computing threats