SlideShare a Scribd company logo
Mobile Security
For the modern tech mogul
Andrew Schwabe, Founder
Background
• WCU Computer Science Alumni
• Entrepreneur
• Mobile, Social, Cloud Developer
• Founder of Point.IO
A Whole New World
• Smartphones, Tablets
and Phablets
• Mobile will overtake
desktop in 2015
• BYOD trend
… Same Sandbox
• You leave a “digital footprint”
everywhere you go
• Most smartphones have
services enabled that you
don’t know about
• 50% of enterprises have had a
mobile data security breach
Being a safe netizen
Becoming a safe netizen
• Mobility is awesome
Becoming a safe netizen
• Mobility is awesome
• ignorant < you < paranoid
• Be informed and you don’t
have to fear
• Mobile power requires
responsibility
Not all devices are equal
• Each OS has different security goals
• Apps have different screening
processes
• Apple i-devices
• Android
• Blackberry
• Windows Mobile
• Symbian/Palm/Others?
• Which is better?
Safety goals:
• Not losing your device, duh
• Prevent identify theft
• Prevent loss of passwords and dignity
• Prevent family and friends from suffering
the same fate…
• On their own accord, or…
• Because you gave it to them
Apps and Tweets and Phreaks, oh my!
• Lots of things can get’cha, but…
• That’s no different than swimming in
the ocean. You just need to know
places to avoid sharks and other
baddies.
• Use common sense.
Three categories of “bad stuff:”
•Email and communication threats
•Malware
•Phishing
Email:
• Viruses can be spread through email
• Usually Attachments
• Usually only affect desktops
(this will change over time)
• You don’t want the virus (or to spread it)
• Best course of action:
• Don’t open email from unknown/weird
addresses
• Don’t open email attachments you were
not expecting
SMS and MMC:
• Generally pretty harmless
• Sometimes contain links to websites that look
weird. E.g. hax0r.me/pinkbunnies
• The age of spam and sms attacks
will come
• Thumb and others are ok
• Best course of action:
• Don’t click links from unknown/weird addresses
• Don’t click links you were not expecting
WiFi Vulnerability:
• Do you hotspot? Do you know if your phone
CAN hotspot?
• Some smartphones let you configure a
hotspot with no password.
• Best course of action:
• Know if your phone supports it
• Disable it if you aren’t using it
• Disable wifi when you are not home
Bluetooth Vulnerability:
• Unconfigured services are sometimes active
by default
• A skilled hacker can connect to
open bluetooth services and take
control of your smartphone
• Best course of action:
• Disable bluetooth if you aren’t
using it
• Learn how to disable services you are not
using
Malware:
• “My friend Mike’s Android phone had been
acting strangely for awhile. In the middle of
the night, the phone would come alive. It
would meander down various menu paths,
send texts that were gibberish and start
playing poker. Was it bug in the operating
system? Or had Mike been hacked?”
- Forbes (link at end)
Malware:
• “how come my phone|tablet|uber device is
going so slow all of a sudden?”
• Not all mobile apps are by quality (ahem…
‘moral’) developers
• Some apps can install “spyware” which reads
your personal info, runs keystroke loggers, or
create popups.
Malware (cont…):
• Beware of apps that request your personal
information, or that install new services
• Read reviews and ratings before just
downloading apps
• Android more
susceptible than iOS
Phishing:
• They are the ‘fishermen’ and you are the ‘fish’
• Smart scammers who want to trick you into
giving up personal information like:
• Bank account info
• Usernames/passwords
to websites
Phishing (cont…):
• Obviousness
• If its too good to be true,
it probably is.
• You do not have a rich distant
uncle in Botswana that left
you $20M
• If you did, why would you
have to pay a fee to get it?
Phishing (cont…):
• Social Media
• Emails meant to look
like Facebook or
twitter asking for your
password
• Services usually won’t
send you an email asking for this information
• “Change your password” emails should only
be trusted if YOU requested them
Phishing (cont…):
• Sp00f websites and DNS poisoning
• Alternate websites meant to
look like your bank.
• When you try to log in, they
capture your username and
password, but return a
“account not available right
now” or similar message
ALWAYS and NEVER list:
• Mama always said to never use ‘always’ and
‘never’ in a sentence…
• … Mama didn’t carry
no Android Phablet…
ALWAYS and NEVER list:
• NEVER open email links and
attachments from suspicious
or unknown people
• Includes unusual attachments
from people you know, but you
were not expecting
• “crazycool_giraffe_parasailing.
mov.pif”
ALWAYS and NEVER list:
• NEVER open links from emails that are asking
you for usernames and passwords.
• Almost always a scam (real sites know
better than to send emails like that)
• If your spam filter caught it, best to leave it
alone
• If it’s a bank email, try calling your local
branch. If they never heard of it… danger!
• If in doubt, throw it out
ALWAYS and NEVER list:
• NEVER post anything on any site unless:
• You are ok with the whole world knowing it
• Family picnic and birthday pics = ok
• Skinny dipping pics = never ok
• Ever read the EULA for facebook and
others? They OWN your content…
ALWAYS and NEVER list:
• NEVER email or post personal and sensitive
information if at all possible:
• Credit card numbers
• Bank info
• Maybe home address, vacation info
• Never know who will see it
• Easy to exploit your weaknesses
ALWAYS and NEVER list:
• ALWAYS use basic security
lock on your mobile devices:
• PIN codes on Apple
devices
• Password/pattern locks
for Android
ALWAYS and NEVER list:
• ALWAYS use apps that YOU installed:
• Verify that they are from a trusted author
• Read ratings/comments
• Use a bank’s APP instead of website if
possible
ALWAYS and NEVER list:
• ALWAYS disable services you don’t need:
• Disable wifi/bluetooth if/when you don’t
need them
• NFC, ssh, jailbreak and root apps
• BONUS! Fewer running things = less battery
Symptoms of a hacked phone:
• Unusual restarts
• Slow response time
• Web browser redirects to
inappropriate sites
• Phone sends text messages
on its own
• Online credit card charges start
showing up
• Plane tickets to Amsterdam
What to do if you are hacked:
• Log out from your app or website
• Switch to a different device
• Change your password
• Call your credit card company
• Request a credit alert with
credit bureau
• Erase/restore your mobile device
Tips for being safe:
• Incognito mode in some web browsers
• Read the manual that came with your device
• Learn all the the stuff you don’t know
• Google ‘security tweaks for Samsung galaxy
note 2’ (or your device)
• Use a lost and found service
• Apple has several app and gps based choices
• 3rd party labels – foundkarma.com
More reading:
• Cloud storage (Box, Dropbox, others)
• Google and Facebook’s new privacy rules
• Read ‘technology’ channel using Flipboard
Reference and Stories:
• Your Phone Has Been Hacked
• Signs and Symptoms of a hacked smartphone
Thank You!
• Blog: www.PainInTheApps.com
• Personal Email: andrew@schwabe.net
• Twitter: @aschwabe
• This presentation will be posted on my blog
and my twitter
Special Thanks to:
• http://www.theoatmeal.com for cartoon
awesomeness used in this presentation
• Kim Slattery and West Chester University for
the opportunity to share
• All the attendees who participated in our
session!

More Related Content

What's hot

CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
jitiyaashwin
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
KanelandSvihlik
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
sirchriss
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
B2BPlanner Ltd.
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Naheelah Irving
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
Yumonomics
 
For schoolchildren1
For schoolchildren1For schoolchildren1
For schoolchildren1
Vinay Kumar
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
alicelagajino
 
Introduction to instagram
Introduction to instagramIntroduction to instagram
Introduction to instagram
CJonesDigital
 
Internet safety
Internet safetyInternet safety
Internet safety
Aleksandra Brmbota
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
rowenick
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
Online Safety Lesson 5th grade
Online Safety Lesson 5th gradeOnline Safety Lesson 5th grade
Online Safety Lesson 5th gradeBelinda Larson
 
Instant Messaging Chat Room Saftey Afnan, Hussam
Instant Messaging Chat Room Saftey   Afnan, HussamInstant Messaging Chat Room Saftey   Afnan, Hussam
Instant Messaging Chat Room Saftey Afnan, Hussamguest40f537
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Leslie Witten
 

What's hot (16)

CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
For schoolchildren1
For schoolchildren1For schoolchildren1
For schoolchildren1
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Internetsecurity
InternetsecurityInternetsecurity
Internetsecurity
 
Introduction to instagram
Introduction to instagramIntroduction to instagram
Introduction to instagram
 
Internet safety
Internet safetyInternet safety
Internet safety
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Online Safety Lesson 5th grade
Online Safety Lesson 5th gradeOnline Safety Lesson 5th grade
Online Safety Lesson 5th grade
 
Instant Messaging Chat Room Saftey Afnan, Hussam
Instant Messaging Chat Room Saftey   Afnan, HussamInstant Messaging Chat Room Saftey   Afnan, Hussam
Instant Messaging Chat Room Saftey Afnan, Hussam
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Viewers also liked

NeoNet - Introductie portfolio management
NeoNet - Introductie portfolio managementNeoNet - Introductie portfolio management
NeoNet - Introductie portfolio managementNeoNet
 
Leadership Styles
Leadership StylesLeadership Styles
Leadership Styles
ralindha
 
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Andrew Schwabe
 
Pulp And Paper Isf
Pulp And Paper IsfPulp And Paper Isf
Pulp And Paper Isf
Monica Barros
 
Rm overview
Rm overviewRm overview
Rm overviewFulcrum
 
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
Andrew Schwabe
 
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Reining in the Data   ITAG tech360 Penn State Great Valley 2015 Reining in the Data   ITAG tech360 Penn State Great Valley 2015
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Andrew Schwabe
 
Icord 2007
Icord 2007Icord 2007
Icord 2007
Monica Barros
 
Barros Monica Isf2012
Barros Monica Isf2012Barros Monica Isf2012
Barros Monica Isf2012
Monica Barros
 
NeoNet - Introductie organizational fitness
NeoNet - Introductie organizational fitnessNeoNet - Introductie organizational fitness
NeoNet - Introductie organizational fitnessNeoNet
 
Barros monica isf2012
Barros monica isf2012Barros monica isf2012
Barros monica isf2012
Monica Barros
 
Southeast load
Southeast loadSoutheast load
Southeast load
Monica Barros
 
Devops With Boxfuse and Shippable
Devops With Boxfuse and ShippableDevops With Boxfuse and Shippable
Devops With Boxfuse and Shippable
Andrew Schwabe
 
Residential%20 Electrical%20 Energy%20 Consumption%20 Profile%20in%20 Brazil
Residential%20 Electrical%20 Energy%20 Consumption%20 Profile%20in%20 BrazilResidential%20 Electrical%20 Energy%20 Consumption%20 Profile%20in%20 Brazil
Residential%20 Electrical%20 Energy%20 Consumption%20 Profile%20in%20 Brazil
Monica Barros
 
JJR Marketing Presentation
JJR Marketing PresentationJJR Marketing Presentation
JJR Marketing Presentation
Jackie Ruiz
 
Ecomod 2007
Ecomod 2007Ecomod 2007
Ecomod 2007
Monica Barros
 
Work Place Motivation
Work Place MotivationWork Place Motivation
Work Place Motivation
ralindha
 
Time series and forecasting from wikipedia
Time series and forecasting from wikipediaTime series and forecasting from wikipedia
Time series and forecasting from wikipedia
Monica Barros
 
Leadership Styles
Leadership StylesLeadership Styles
Leadership Styles
ralindha
 

Viewers also liked (19)

NeoNet - Introductie portfolio management
NeoNet - Introductie portfolio managementNeoNet - Introductie portfolio management
NeoNet - Introductie portfolio management
 
Leadership Styles
Leadership StylesLeadership Styles
Leadership Styles
 
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
 
Pulp And Paper Isf
Pulp And Paper IsfPulp And Paper Isf
Pulp And Paper Isf
 
Rm overview
Rm overviewRm overview
Rm overview
 
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
 
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Reining in the Data   ITAG tech360 Penn State Great Valley 2015 Reining in the Data   ITAG tech360 Penn State Great Valley 2015
Reining in the Data ITAG tech360 Penn State Great Valley 2015
 
Icord 2007
Icord 2007Icord 2007
Icord 2007
 
Barros Monica Isf2012
Barros Monica Isf2012Barros Monica Isf2012
Barros Monica Isf2012
 
NeoNet - Introductie organizational fitness
NeoNet - Introductie organizational fitnessNeoNet - Introductie organizational fitness
NeoNet - Introductie organizational fitness
 
Barros monica isf2012
Barros monica isf2012Barros monica isf2012
Barros monica isf2012
 
Southeast load
Southeast loadSoutheast load
Southeast load
 
Devops With Boxfuse and Shippable
Devops With Boxfuse and ShippableDevops With Boxfuse and Shippable
Devops With Boxfuse and Shippable
 
Residential%20 Electrical%20 Energy%20 Consumption%20 Profile%20in%20 Brazil
Residential%20 Electrical%20 Energy%20 Consumption%20 Profile%20in%20 BrazilResidential%20 Electrical%20 Energy%20 Consumption%20 Profile%20in%20 Brazil
Residential%20 Electrical%20 Energy%20 Consumption%20 Profile%20in%20 Brazil
 
JJR Marketing Presentation
JJR Marketing PresentationJJR Marketing Presentation
JJR Marketing Presentation
 
Ecomod 2007
Ecomod 2007Ecomod 2007
Ecomod 2007
 
Work Place Motivation
Work Place MotivationWork Place Motivation
Work Place Motivation
 
Time series and forecasting from wikipedia
Time series and forecasting from wikipediaTime series and forecasting from wikipedia
Time series and forecasting from wikipedia
 
Leadership Styles
Leadership StylesLeadership Styles
Leadership Styles
 

Similar to Mobile Security for the Modern Tech Mogul

Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayanehaz
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
KevinRiley83
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
CharithraaAR
 
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWVA HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
Adam Compton
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
Barry Caplin
 
Internet security
Internet securityInternet security
Internet security
Mohammed Adam
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
DjTechs
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
Ronald Soh
 
Internet Security
Internet SecurityInternet Security
Internet Security
mjelson
 
Lesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internetLesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internet
San Diego Continuing Education
 
Information Security Awareness Orientation
Information Security Awareness OrientationInformation Security Awareness Orientation
Information Security Awareness Orientation
mohannadalhanahnah
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
samina khan
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
Brian Pichman
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Steve Poole
 
Beginners guide to the internet 26.10.15
Beginners guide to the internet 26.10.15Beginners guide to the internet 26.10.15
Beginners guide to the internet 26.10.15
Get up to Speed
 
Beginners guide to the internet 26.10.15 & 30.10.15
Beginners guide to the internet 26.10.15 & 30.10.15Beginners guide to the internet 26.10.15 & 30.10.15
Beginners guide to the internet 26.10.15 & 30.10.15
Get up to Speed
 
IT Security Awareness Posters
IT Security Awareness PostersIT Security Awareness Posters
IT Security Awareness Posters
Dr. Ramkumar Lakshminarayanan
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
Steve Poole
 

Similar to Mobile Security for the Modern Tech Mogul (20)

Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWVA HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Internet security
Internet securityInternet security
Internet security
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Lesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internetLesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internet
 
Information Security Awareness Orientation
Information Security Awareness OrientationInformation Security Awareness Orientation
Information Security Awareness Orientation
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Beginners guide to the internet 26.10.15
Beginners guide to the internet 26.10.15Beginners guide to the internet 26.10.15
Beginners guide to the internet 26.10.15
 
Beginners guide to the internet 26.10.15 & 30.10.15
Beginners guide to the internet 26.10.15 & 30.10.15Beginners guide to the internet 26.10.15 & 30.10.15
Beginners guide to the internet 26.10.15 & 30.10.15
 
IT Security Awareness Posters
IT Security Awareness PostersIT Security Awareness Posters
IT Security Awareness Posters
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 

Recently uploaded

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

Mobile Security for the Modern Tech Mogul

  • 1. Mobile Security For the modern tech mogul Andrew Schwabe, Founder
  • 2. Background • WCU Computer Science Alumni • Entrepreneur • Mobile, Social, Cloud Developer • Founder of Point.IO
  • 3. A Whole New World • Smartphones, Tablets and Phablets • Mobile will overtake desktop in 2015 • BYOD trend
  • 4. … Same Sandbox • You leave a “digital footprint” everywhere you go • Most smartphones have services enabled that you don’t know about • 50% of enterprises have had a mobile data security breach
  • 5. Being a safe netizen
  • 6. Becoming a safe netizen • Mobility is awesome
  • 7. Becoming a safe netizen • Mobility is awesome • ignorant < you < paranoid • Be informed and you don’t have to fear • Mobile power requires responsibility
  • 8. Not all devices are equal • Each OS has different security goals • Apps have different screening processes • Apple i-devices • Android • Blackberry • Windows Mobile • Symbian/Palm/Others? • Which is better?
  • 9.
  • 10. Safety goals: • Not losing your device, duh • Prevent identify theft • Prevent loss of passwords and dignity • Prevent family and friends from suffering the same fate… • On their own accord, or… • Because you gave it to them
  • 11. Apps and Tweets and Phreaks, oh my! • Lots of things can get’cha, but… • That’s no different than swimming in the ocean. You just need to know places to avoid sharks and other baddies. • Use common sense.
  • 12. Three categories of “bad stuff:” •Email and communication threats •Malware •Phishing
  • 13. Email: • Viruses can be spread through email • Usually Attachments • Usually only affect desktops (this will change over time) • You don’t want the virus (or to spread it) • Best course of action: • Don’t open email from unknown/weird addresses • Don’t open email attachments you were not expecting
  • 14. SMS and MMC: • Generally pretty harmless • Sometimes contain links to websites that look weird. E.g. hax0r.me/pinkbunnies • The age of spam and sms attacks will come • Thumb and others are ok • Best course of action: • Don’t click links from unknown/weird addresses • Don’t click links you were not expecting
  • 15. WiFi Vulnerability: • Do you hotspot? Do you know if your phone CAN hotspot? • Some smartphones let you configure a hotspot with no password. • Best course of action: • Know if your phone supports it • Disable it if you aren’t using it • Disable wifi when you are not home
  • 16. Bluetooth Vulnerability: • Unconfigured services are sometimes active by default • A skilled hacker can connect to open bluetooth services and take control of your smartphone • Best course of action: • Disable bluetooth if you aren’t using it • Learn how to disable services you are not using
  • 17. Malware: • “My friend Mike’s Android phone had been acting strangely for awhile. In the middle of the night, the phone would come alive. It would meander down various menu paths, send texts that were gibberish and start playing poker. Was it bug in the operating system? Or had Mike been hacked?” - Forbes (link at end)
  • 18. Malware: • “how come my phone|tablet|uber device is going so slow all of a sudden?” • Not all mobile apps are by quality (ahem… ‘moral’) developers • Some apps can install “spyware” which reads your personal info, runs keystroke loggers, or create popups.
  • 19. Malware (cont…): • Beware of apps that request your personal information, or that install new services • Read reviews and ratings before just downloading apps • Android more susceptible than iOS
  • 20. Phishing: • They are the ‘fishermen’ and you are the ‘fish’ • Smart scammers who want to trick you into giving up personal information like: • Bank account info • Usernames/passwords to websites
  • 21. Phishing (cont…): • Obviousness • If its too good to be true, it probably is. • You do not have a rich distant uncle in Botswana that left you $20M • If you did, why would you have to pay a fee to get it?
  • 22. Phishing (cont…): • Social Media • Emails meant to look like Facebook or twitter asking for your password • Services usually won’t send you an email asking for this information • “Change your password” emails should only be trusted if YOU requested them
  • 23. Phishing (cont…): • Sp00f websites and DNS poisoning • Alternate websites meant to look like your bank. • When you try to log in, they capture your username and password, but return a “account not available right now” or similar message
  • 24. ALWAYS and NEVER list: • Mama always said to never use ‘always’ and ‘never’ in a sentence… • … Mama didn’t carry no Android Phablet…
  • 25. ALWAYS and NEVER list: • NEVER open email links and attachments from suspicious or unknown people • Includes unusual attachments from people you know, but you were not expecting • “crazycool_giraffe_parasailing. mov.pif”
  • 26. ALWAYS and NEVER list: • NEVER open links from emails that are asking you for usernames and passwords. • Almost always a scam (real sites know better than to send emails like that) • If your spam filter caught it, best to leave it alone • If it’s a bank email, try calling your local branch. If they never heard of it… danger! • If in doubt, throw it out
  • 27. ALWAYS and NEVER list: • NEVER post anything on any site unless: • You are ok with the whole world knowing it • Family picnic and birthday pics = ok • Skinny dipping pics = never ok • Ever read the EULA for facebook and others? They OWN your content…
  • 28. ALWAYS and NEVER list: • NEVER email or post personal and sensitive information if at all possible: • Credit card numbers • Bank info • Maybe home address, vacation info • Never know who will see it • Easy to exploit your weaknesses
  • 29. ALWAYS and NEVER list: • ALWAYS use basic security lock on your mobile devices: • PIN codes on Apple devices • Password/pattern locks for Android
  • 30. ALWAYS and NEVER list: • ALWAYS use apps that YOU installed: • Verify that they are from a trusted author • Read ratings/comments • Use a bank’s APP instead of website if possible
  • 31. ALWAYS and NEVER list: • ALWAYS disable services you don’t need: • Disable wifi/bluetooth if/when you don’t need them • NFC, ssh, jailbreak and root apps • BONUS! Fewer running things = less battery
  • 32. Symptoms of a hacked phone: • Unusual restarts • Slow response time • Web browser redirects to inappropriate sites • Phone sends text messages on its own • Online credit card charges start showing up • Plane tickets to Amsterdam
  • 33. What to do if you are hacked: • Log out from your app or website • Switch to a different device • Change your password • Call your credit card company • Request a credit alert with credit bureau • Erase/restore your mobile device
  • 34. Tips for being safe: • Incognito mode in some web browsers • Read the manual that came with your device • Learn all the the stuff you don’t know • Google ‘security tweaks for Samsung galaxy note 2’ (or your device) • Use a lost and found service • Apple has several app and gps based choices • 3rd party labels – foundkarma.com
  • 35. More reading: • Cloud storage (Box, Dropbox, others) • Google and Facebook’s new privacy rules • Read ‘technology’ channel using Flipboard
  • 36. Reference and Stories: • Your Phone Has Been Hacked • Signs and Symptoms of a hacked smartphone
  • 37. Thank You! • Blog: www.PainInTheApps.com • Personal Email: andrew@schwabe.net • Twitter: @aschwabe • This presentation will be posted on my blog and my twitter
  • 38. Special Thanks to: • http://www.theoatmeal.com for cartoon awesomeness used in this presentation • Kim Slattery and West Chester University for the opportunity to share • All the attendees who participated in our session!