SlideShare a Scribd company logo
Mobile 
Security 
Presenter 
Ajay Nawani 
AVP Presales 
Global Operations
Mobile Revolution
What is a Smartphone? 
Mobile Broadband 
Bluetooth 
Apps 
Calling 
Camera 
GPS 
Messaging 
Gaming 
Touch Screen 
NFC 
Hotspot
Mobile OS 
Q2 2014 
Android iOS Windows Phone BlackBerry OS Others
Mobile Broadband 
237 kbps 0.4 -16 Mbps 21 – 100 Mbps 
Usage pattern 
Infotainment (News, Songs, Videos, Games, Fun Apps) 
Social Networking + Free Texting 
VOIP (free/subsidized calling) 
Emails 
Mobile Payments (e-commerce)
Wi-Fi Hotspot
GPS
GPS
Bluetooth
Camera 
Major Impact 
Photographic Art 
Citizen Journalism 
Selfie Phenomenon
Messaging
Mobile Wallet
Mobile Wallet
Apps 
Major Impact 
Transformed Internet Usage 
behavior 
Instrumental role in 
consumerization of IT 
Have become a boon for 
marketers & business owners
MOBILE 
SECURITY 
CHALLENGES
How about your PRIVACY?
How about your PRIVACY?
How about your PRIVACY?
What Google knows about a user?
Social Engineering
Social Media!
Information 
gathering 
Development 
of 
relationship 
Exploitation 
of 
relationship 
Execution to 
achieve the 
objective 
Social Engineering
Privacy
Snapchat Hack: 200,000 'Self-Destruct' Nude Images Set to Leak 
Company says third-party applications were responsible for the breach 
of as many as 200,000 user accounts 
Privacy
Privacy 
iCloud Hacked: 100+ Celebrities Nude Picture Leaks
Use with care! 
Tons of Applications!
Recognize this!
Super-Bright vs Flashlight
Flashlight Applications!
Mobile Malwares
Mobile Marketing 
Push notifications 
App-based marketing 
In-game mobile marketing 
Mobile web marketing 
QR codes 
Bluetooth 
Proximity systems 
Location-based services 
CONCERNS! 
Mobile Spam 
Personal Identification 
Location Information 
Wireless Security
Security Tips!!!
Use with caution! 
SMS Manager, Dialer, Keyboard, Launcher, etc. 
All above applications need maximum rights to work!
Check application permissions!
Encryption
Application: Unknown Sources
Use of Two Factor Authentication 
Portals with 2FA: 
All Google Applications 
Microsoft 
Facebook 
Dropbox 
iCloud 
Many…..
Mobile Device Management
Mobile Device Management 
CONTROL 
SECURE PROTECT 
Sophos Mobile 
Security 
Sophos Mobile 
Control 
Sophos Mobile 
Encryption 
Complete Mobile Security
Free: Mobile Security App
Reconfigure Privacy Settings
Reconfigure Privacy Settings
Some more tips! 
1. Turn off WiFi, Location Services and Bluetooth, when not in 
use. 
2. Don’t use a single password for all your online accounts. 
3. Install Apps only from trusted sources. 
4. Backup your data. 
5. Keep your Apps and mobile OS updated. 
6. Don’t tamper with phone settings you don’t know about. 
7. Always log out of banking and shopping sites. 
8. Avoid texting or emailing critical personal/account 
information. 
9. Don’t click on links or attachments in unsolicited emails or 
text messages.
Our Little Initiative 
Cyberoam Academy
Cyberoam Academy 
Bridging the missing link of education, career, Industry
Industry-focused Learning Modules 
The program offers in-depth learning 
• Module 1: Internetworking Technologies 
• Module 2: Network Security's Nuts & Bolts 
• Module 3: Building a Secure Network 
• Module 4: Firewall 
• Module 5: User Authentication 
• Module 6: Web Filter 
• Module 7: Application Firewall 
• Module 8: Network Threat Protection 
• Module 9: Virtual Private Network (VPN) 
• Module 10: Bandwidth Management 
• Module 11: Network High Availability 
• Module 12: Managing Security Solution 
• Module 13: Ethical Hacks & Penetration Test 
• Module 14: Network Forensics
Cyberoam Academies 
 
EUROPE: 
 Nescot, UK 
 Northumberland College, UK 
 Birmingham City University, UK 
 Kaunas University of Technology, Lithuania 
 Kazimieras Simonavičius University, Vilnius 
 CESI Bordeaux, France 
 La Rochelle University, France 
 LATIN AMERICA: 
 UTC ( Technological University of Coahuila), Mexico 
 MIDDLE EAST: 
 Muscat College, Oman 
 Bartin University, Turkey 
 Isra University, Jordan
Cyberoam Academies 
 AFRICA: 
 Institute for Information Technology, Tanzania 
 Victoria University, Uganda 
 Dominion University, Ghana 
 International University of East Africa, Uganda 
 Uganda Technology and Management University, Uganda 
 Catholic University, Mozambique 
 ASIA: 
 Universiti Teknologi Malaysia, Malaysia 
 iSPACE College of IT Vocational Education, Vietnam 
 Marwadi Education Foundation, India 
 HTC Institute of Technology, India 
 TAC Global, India 
 Charotar University of Science and Technology, India 
 L. J. Group of Institutes, India 
Total: 30
Thank You. 
Ajay.Nawani@cyberoam.com

More Related Content

What's hot

Mobile security
Mobile securityMobile security
Mobile security
Naveen Kumar
 
Mobile security
Mobile securityMobile security
Mobile security
Tapan Khilar
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
JASHU JASWANTH
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
cclark_isec
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
Quick Heal Technologies Ltd.
 
Mobile security
Mobile securityMobile security
Mobile security
dilipdubey5
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
Manish Gupta
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
Geo Marian
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
Xavier Mertens
 
Security models of modern mobile systems
Security models of modern mobile systemsSecurity models of modern mobile systems
Security models of modern mobile systems
Divya Raval
 
Cybersecurity - Mobile Application Security
Cybersecurity - Mobile Application SecurityCybersecurity - Mobile Application Security
Cybersecurity - Mobile Application Security
Eryk Budi Pratama
 
OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017
TecsyntSolutions
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app security
NowSecure
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Edureka!
 
Android security
Android securityAndroid security
Android security
Mobile Rtpl
 
Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
Novizul Evendi
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
Pushkar Pashupat
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Jay Nagar
 
Cyber security
Cyber securityCyber security
Cyber security
vishakha bhagwat
 

What's hot (20)

Mobile security
Mobile securityMobile security
Mobile security
 
Mobile security
Mobile securityMobile security
Mobile security
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Android security
Android securityAndroid security
Android security
 
Security models of modern mobile systems
Security models of modern mobile systemsSecurity models of modern mobile systems
Security models of modern mobile systems
 
Cybersecurity - Mobile Application Security
Cybersecurity - Mobile Application SecurityCybersecurity - Mobile Application Security
Cybersecurity - Mobile Application Security
 
OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app security
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Android security
Android securityAndroid security
Android security
 
Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 

Viewers also liked

Mobile Privacy & Litigation presented by Sedgwick at the #MobiU2013 Summit, 9...
Mobile Privacy & Litigation presented by Sedgwick at the #MobiU2013 Summit, 9...Mobile Privacy & Litigation presented by Sedgwick at the #MobiU2013 Summit, 9...
Mobile Privacy & Litigation presented by Sedgwick at the #MobiU2013 Summit, 9...
Kimberly-Clark
 
Mobile: Location Privacy and Apps_Michael Hanley
Mobile: Location Privacy and Apps_Michael HanleyMobile: Location Privacy and Apps_Michael Hanley
Mobile: Location Privacy and Apps_Michael Hanley
Sara Quinn
 
Mobile Regulations, Laws and Procedures_Michael Hanley
Mobile Regulations, Laws and Procedures_Michael HanleyMobile Regulations, Laws and Procedures_Michael Hanley
Mobile Regulations, Laws and Procedures_Michael Hanley
Sara Quinn
 
Data protection - Presentation by Dr. Kalyan Kankanala
Data protection - Presentation by Dr. Kalyan KankanalaData protection - Presentation by Dr. Kalyan Kankanala
Data protection - Presentation by Dr. Kalyan Kankanala
BananaIP Counsels
 
Zimmer laws of social networking slides
Zimmer laws of social networking slidesZimmer laws of social networking slides
Zimmer laws of social networking slides
Michael Zimmer
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
fariez91
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
Chetan Bharadwaj
 
Cyber law
Cyber lawCyber law

Viewers also liked (8)

Mobile Privacy & Litigation presented by Sedgwick at the #MobiU2013 Summit, 9...
Mobile Privacy & Litigation presented by Sedgwick at the #MobiU2013 Summit, 9...Mobile Privacy & Litigation presented by Sedgwick at the #MobiU2013 Summit, 9...
Mobile Privacy & Litigation presented by Sedgwick at the #MobiU2013 Summit, 9...
 
Mobile: Location Privacy and Apps_Michael Hanley
Mobile: Location Privacy and Apps_Michael HanleyMobile: Location Privacy and Apps_Michael Hanley
Mobile: Location Privacy and Apps_Michael Hanley
 
Mobile Regulations, Laws and Procedures_Michael Hanley
Mobile Regulations, Laws and Procedures_Michael HanleyMobile Regulations, Laws and Procedures_Michael Hanley
Mobile Regulations, Laws and Procedures_Michael Hanley
 
Data protection - Presentation by Dr. Kalyan Kankanala
Data protection - Presentation by Dr. Kalyan KankanalaData protection - Presentation by Dr. Kalyan Kankanala
Data protection - Presentation by Dr. Kalyan Kankanala
 
Zimmer laws of social networking slides
Zimmer laws of social networking slidesZimmer laws of social networking slides
Zimmer laws of social networking slides
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber law
Cyber lawCyber law
Cyber law
 

Similar to Mobile security

Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
Quick Heal Technologies Ltd.
 
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2
 
WEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfWEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdf
Setiya Nugroho
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
McAlester Army Ammunition Plant
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutions
Saad Ahmad
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
SHOLOVE INTERNATIONAL LLC
 
Marketing Plan For an Android App
Marketing Plan For an Android AppMarketing Plan For an Android App
Marketing Plan For an Android App
RAMAN PREET SINGH KHERA
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
Sheikh Ali Asghar
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
IBM Security
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
Michael Davis
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
CAS
 
How BYOD Will Shape Wireless Network Security in 2012
How BYOD Will Shape Wireless Network Security in 2012How BYOD Will Shape Wireless Network Security in 2012
How BYOD Will Shape Wireless Network Security in 2012
hemantchaskar
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
VISTA InfoSec
 
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรการสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
Software Park Thailand
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
Naval OPSEC
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
Advanced monitoring
 
Mobile security trends
Mobile security trendsMobile security trends
Mobile security trendsKen Huang
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
Distil Networks
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
IRJET Journal
 

Similar to Mobile security (20)

Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Tt 06-ck
Tt 06-ckTt 06-ck
Tt 06-ck
 
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
 
WEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfWEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdf
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutions
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Marketing Plan For an Android App
Marketing Plan For an Android AppMarketing Plan For an Android App
Marketing Plan For an Android App
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
How BYOD Will Shape Wireless Network Security in 2012
How BYOD Will Shape Wireless Network Security in 2012How BYOD Will Shape Wireless Network Security in 2012
How BYOD Will Shape Wireless Network Security in 2012
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรการสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
 
Mobile security trends
Mobile security trendsMobile security trends
Mobile security trends
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 

Mobile security

Editor's Notes

  1. Feature Phones in principle could have had most of these features… But they lacked the flexibility for app development. Smart Phones enhanced user experience with bigger touch screens, higher computing speeds, better Operating Systems and an entire APP Ecosystem.
  2. Android 84.70% iOS 11.70% Windows Phone 2.50% BlackBerry OS 0.50% Others 0.70% http://www.idc.com/prodserv/smartphone-os-market-share.jsp
  3. Usage pattern differs from region to region Reality Check! – India’s rank - 113 Though India ranks low in terms of internet mobile penetration, the number is rising at a very high rate like elsewhere in the rest of developing world. http://www.telecomlead.com/news/itu-ranks-india-125-for-fixed-broadband-113-for-mobile-internet-53100
  4. http://corvusgps.com/
  5. With some GPS based apps, you can track people using smartphone.
  6. Cellphone cameras have led to development of an entirely new kind of photographic art movement. Unlike before, digital photography is a serious business now. There are dedicated film festivals for cellphone photography and cinema enthusiasts http://iftc.org.in/cell-phone-cinema/ Additionally, it has created a revolution in citizen journalism. And as we are all aware, it is also responsible for inventing the dictionary word- Selfie
  7. Though, new age data based messengers have overtook the conventional text messaging, though it is still prominently used by marketers and in some other applications – INNOZ www.innoz.in http://55444.in/ Innoz- Internet through SMS, SMS based applications for Feature Phones Innoz’s flagship product 55444 also known as SMSGyan is an offline search engine that allows its users to search the web by sending an SMS.
  8. Internet usage behavior – Browser based internet surfing is increasingly getting replaced by app based usage. More people read mails on phone…Mobile email opens have grown with 21% in 2013, from 43% in Jan to 51% in December 2013. Litmus –”Email Analytics” (Jan 2014) http://www.emailmonday.com/mobile-email-usage-statistics Users are more likely to close a webpage if it doesn’t open properly on mobile phone. Businesses have thus optimized their company web pages or created mobile websites and apps to meet customer expectations. This in turn has opened gates for a lot of new opportunities for them and online marketers. – Monetizing the mobile space has become the single largest pursuit for all leading organizations (Facebook, Google, Microsoft, Yahoo etc) as Mobile is where the future is.
  9. Talk about Big data concept to store these much information
  10. http://www.dailymail.co.uk/news/article-2650492/Vodafone-reveals-governments-listen-private-mobile-phone-calls-flick-switch-entire-network-stretches-29-countries-world.html
  11. There are numerous challenges or flaws with the same smartphone features that have popularized them this much. Malwares tend to exploit these flaws. Major problem – Android is most desirable platform among the users worldwide. People prefer these devices due to the open source platform, low cost and simple interface. Hence, the attackers are also targeting this platform to reach the maximum devices. http://www.cyberoam.com/blog/first-android-ransomware-reported/
  12. http://en.wikipedia.org/wiki/Mobile_marketing#Privacy_concerns_in_mobile_marketing
  13. We started out as a one product vendor. With the launch of Sophos Mobile Security as the ‘anti-virus app for Android devices, we entered into territory that we know inside and out. Sophos Mobile Encryption, our viewer for encrypted files in cloud storage, extends data protection to mobile devices – another one of our areas of expertise. Together these products give our customers more complete protection for mobile devices
  14. http://www.intel.in/content/dam/www/public/us/en/documents/guides/10-quick-tips-to-mobile-security-guide.pdf