SlideShare a Scribd company logo
1 of 7
0All Rights Reserved © 2017
Zimperium Global Threat Intelligence
Q2 2017
The Threat Is Real
1All Rights Reserved © 2017
Mobile OS is Constantly Changing
Source: CVE.Mitre.org. CVEDetails.com: Android and iOS CVEs
0
100
200
300
400
500
600
700
800
2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017
CVE Score 7+
CVE Score 1-6
First half of
2017 nearly
surpassed
all of 2016
2All Rights Reserved © 2017
Device Risks
23% of iOS
devices not
updated despite
update being
available for 45
days
94% of Android
devices not
running latest 2
versions
23%
94%
Source: Zimperium Global Threat Report Q2 2017
https://blog.zimperium.com/mobile-threat-data-q2-2017/
3All Rights Reserved © 2017
iOS Device Risks
23% of iOS
devices not
updated despite
update being
available for 45
days
Approximately 1 of 4
devices are not
running the latest
security patches and
introducing
unnecessary risk
Source: Zimperium Global Threat Report Q2 2017
https://blog.zimperium.com/mobile-threat-data-q2-2017/
4All Rights Reserved © 2017
Network Threats
5 % of devices
detected a scan
80% of these
devices detected a
MITM
Source: Zimperium Global Threat Report Q2 2017
https://blog.zimperium.com/mobile-threat-data-q2-2017/
5All Rights Reserved © 2017
1 of 50 iOS
apps have
severe privacy
and security
issues.
App Threats
• Malware
• Shares Keychain
• Weak Encryption
• Private Dev
Frameworks
• Shares Private Info
• Reads Device ID
• Stores over USB
Source: Zimperium Global Threat Report Q2 2017
https://blog.zimperium.com/mobile-threat-data-q2-2017/
6All Rights Reserved © 2017

More Related Content

What's hot

2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity PredictionsPaloAltoNetworks
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4IBM Security
 
The state of mobile app security
The state of mobile app security The state of mobile app security
The state of mobile app security Mahima Anand Sharma
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017Ramiro Cid
 
T.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirtyT.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirtyAdam Radly
 
Mobile security
Mobile securityMobile security
Mobile securityhome
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatibleLookout
 
Mobile Security
Mobile SecurityMobile Security
Mobile SecurityKevin Lee
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessIBM Security
 
Cloud Access Security Brokers
Cloud Access Security BrokersCloud Access Security Brokers
Cloud Access Security BrokersAbhishek Tripathi
 
Four Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud GenerationFour Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud GenerationAboutSSL
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
Sahilmod 120315100301-phpapp01
Sahilmod 120315100301-phpapp01Sahilmod 120315100301-phpapp01
Sahilmod 120315100301-phpapp01Nelito Systems Ltd
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseNowSecure
 
Security and Your Business
Security and Your BusinessSecurity and Your Business
Security and Your BusinessAll Covered
 
Understanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent ThemUnderstanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent ThemMarketingArrowECS_CZ
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsSkycure
 
Tackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsTackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsCYBERWISER .eu
 

What's hot (20)

2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4
 
The state of mobile app security
The state of mobile app security The state of mobile app security
The state of mobile app security
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
T.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirtyT.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirty
 
Mobile security
Mobile securityMobile security
Mobile security
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud Success
 
Cloud Access Security Brokers
Cloud Access Security BrokersCloud Access Security Brokers
Cloud Access Security Brokers
 
Four Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud GenerationFour Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud Generation
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Sahilmod 120315100301-phpapp01
Sahilmod 120315100301-phpapp01Sahilmod 120315100301-phpapp01
Sahilmod 120315100301-phpapp01
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
 
Security and Your Business
Security and Your BusinessSecurity and Your Business
Security and Your Business
 
Understanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent ThemUnderstanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent Them
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 Predictions
 
Surviving the Ransomware Plague
Surviving the Ransomware PlagueSurviving the Ransomware Plague
Surviving the Ransomware Plague
 
Tackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsTackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & Solutions
 
Mobile security
Mobile securityMobile security
Mobile security
 

Viewers also liked

Get financially Fit: Tips for Using QuickBooks
Get financially Fit: Tips for Using QuickBooksGet financially Fit: Tips for Using QuickBooks
Get financially Fit: Tips for Using QuickBooksIntuit Inc.
 
The Best Way to Optimize Physician Workflow
The Best Way to Optimize Physician WorkflowThe Best Way to Optimize Physician Workflow
The Best Way to Optimize Physician WorkflowHealth Catalyst
 
Bricks & Clicks Retail: From Enemies to Allies
Bricks & Clicks Retail: From Enemies to AlliesBricks & Clicks Retail: From Enemies to Allies
Bricks & Clicks Retail: From Enemies to AlliesThe Hershey Company
 
What Is Population Health And How Does It Compare to Public Health
What Is Population Health And How Does It Compare to Public HealthWhat Is Population Health And How Does It Compare to Public Health
What Is Population Health And How Does It Compare to Public HealthHealth Catalyst
 
How to Assess the ROI of Your Population Health Initiative
How to Assess the ROI of Your Population Health InitiativeHow to Assess the ROI of Your Population Health Initiative
How to Assess the ROI of Your Population Health InitiativeHealth Catalyst
 
Five Ways For Improving Hospital Revenue Cycle Management
Five Ways For Improving Hospital Revenue Cycle ManagementFive Ways For Improving Hospital Revenue Cycle Management
Five Ways For Improving Hospital Revenue Cycle ManagementHealth Catalyst
 
Landmark Review of Population Health Management
Landmark Review of Population Health ManagementLandmark Review of Population Health Management
Landmark Review of Population Health ManagementHealth Catalyst
 
Healthcare Interoperability: New Tactics and Technology
Healthcare Interoperability: New Tactics and TechnologyHealthcare Interoperability: New Tactics and Technology
Healthcare Interoperability: New Tactics and TechnologyHealth Catalyst
 
The 3 Must-Have Qualities of a Care Management System
The 3 Must-Have Qualities of a Care Management SystemThe 3 Must-Have Qualities of a Care Management System
The 3 Must-Have Qualities of a Care Management SystemHealth Catalyst
 
Three Approaches to Predictive Analytics in Healthcare
Three Approaches to Predictive Analytics in HealthcareThree Approaches to Predictive Analytics in Healthcare
Three Approaches to Predictive Analytics in HealthcareHealth Catalyst
 
Patient Flight Path Analytics: From Airline Operations to Healthcare Outcomes
Patient Flight Path Analytics: From Airline Operations to Healthcare OutcomesPatient Flight Path Analytics: From Airline Operations to Healthcare Outcomes
Patient Flight Path Analytics: From Airline Operations to Healthcare OutcomesHealth Catalyst
 
How to Sustain Healthcare Quality Improvement in 3 Critical Steps
How to Sustain Healthcare Quality Improvement in 3 Critical StepsHow to Sustain Healthcare Quality Improvement in 3 Critical Steps
How to Sustain Healthcare Quality Improvement in 3 Critical StepsHealth Catalyst
 
How to Evaluate a Clinical Analytics Vendor: A Checklist
How to Evaluate a Clinical Analytics Vendor: A ChecklistHow to Evaluate a Clinical Analytics Vendor: A Checklist
How to Evaluate a Clinical Analytics Vendor: A ChecklistHealth Catalyst
 
MACRA and the New Quality Payment Program
MACRA and the New Quality Payment ProgramMACRA and the New Quality Payment Program
MACRA and the New Quality Payment ProgramHealth Catalyst
 
How to Drive ROI In Your Healthcare Quality Improvement Projects
How to Drive ROI In Your Healthcare Quality Improvement Projects How to Drive ROI In Your Healthcare Quality Improvement Projects
How to Drive ROI In Your Healthcare Quality Improvement Projects Health Catalyst
 
Why Your Healthcare Business Intelligence Strategy Can't Win
Why Your Healthcare Business Intelligence Strategy Can't WinWhy Your Healthcare Business Intelligence Strategy Can't Win
Why Your Healthcare Business Intelligence Strategy Can't WinHealth Catalyst
 
Linking Clinical And Financial Data: The Key To Real Quality And Cost Out
Linking Clinical And Financial Data: The Key To Real Quality And Cost OutLinking Clinical And Financial Data: The Key To Real Quality And Cost Out
Linking Clinical And Financial Data: The Key To Real Quality And Cost OutHealth Catalyst
 
Clinical Data Repository vs. A Data Warehouse - Which Do You Need?
Clinical Data Repository vs. A Data Warehouse - Which Do You Need?Clinical Data Repository vs. A Data Warehouse - Which Do You Need?
Clinical Data Repository vs. A Data Warehouse - Which Do You Need?Health Catalyst
 
4 Best Practices for Analyzing Healthcare Data
4 Best Practices for Analyzing Healthcare Data4 Best Practices for Analyzing Healthcare Data
4 Best Practices for Analyzing Healthcare DataHealth Catalyst
 
What is the best Healthcare Data Warehouse Model for Your Organization?
What is the best Healthcare Data Warehouse Model for Your Organization?What is the best Healthcare Data Warehouse Model for Your Organization?
What is the best Healthcare Data Warehouse Model for Your Organization?Health Catalyst
 

Viewers also liked (20)

Get financially Fit: Tips for Using QuickBooks
Get financially Fit: Tips for Using QuickBooksGet financially Fit: Tips for Using QuickBooks
Get financially Fit: Tips for Using QuickBooks
 
The Best Way to Optimize Physician Workflow
The Best Way to Optimize Physician WorkflowThe Best Way to Optimize Physician Workflow
The Best Way to Optimize Physician Workflow
 
Bricks & Clicks Retail: From Enemies to Allies
Bricks & Clicks Retail: From Enemies to AlliesBricks & Clicks Retail: From Enemies to Allies
Bricks & Clicks Retail: From Enemies to Allies
 
What Is Population Health And How Does It Compare to Public Health
What Is Population Health And How Does It Compare to Public HealthWhat Is Population Health And How Does It Compare to Public Health
What Is Population Health And How Does It Compare to Public Health
 
How to Assess the ROI of Your Population Health Initiative
How to Assess the ROI of Your Population Health InitiativeHow to Assess the ROI of Your Population Health Initiative
How to Assess the ROI of Your Population Health Initiative
 
Five Ways For Improving Hospital Revenue Cycle Management
Five Ways For Improving Hospital Revenue Cycle ManagementFive Ways For Improving Hospital Revenue Cycle Management
Five Ways For Improving Hospital Revenue Cycle Management
 
Landmark Review of Population Health Management
Landmark Review of Population Health ManagementLandmark Review of Population Health Management
Landmark Review of Population Health Management
 
Healthcare Interoperability: New Tactics and Technology
Healthcare Interoperability: New Tactics and TechnologyHealthcare Interoperability: New Tactics and Technology
Healthcare Interoperability: New Tactics and Technology
 
The 3 Must-Have Qualities of a Care Management System
The 3 Must-Have Qualities of a Care Management SystemThe 3 Must-Have Qualities of a Care Management System
The 3 Must-Have Qualities of a Care Management System
 
Three Approaches to Predictive Analytics in Healthcare
Three Approaches to Predictive Analytics in HealthcareThree Approaches to Predictive Analytics in Healthcare
Three Approaches to Predictive Analytics in Healthcare
 
Patient Flight Path Analytics: From Airline Operations to Healthcare Outcomes
Patient Flight Path Analytics: From Airline Operations to Healthcare OutcomesPatient Flight Path Analytics: From Airline Operations to Healthcare Outcomes
Patient Flight Path Analytics: From Airline Operations to Healthcare Outcomes
 
How to Sustain Healthcare Quality Improvement in 3 Critical Steps
How to Sustain Healthcare Quality Improvement in 3 Critical StepsHow to Sustain Healthcare Quality Improvement in 3 Critical Steps
How to Sustain Healthcare Quality Improvement in 3 Critical Steps
 
How to Evaluate a Clinical Analytics Vendor: A Checklist
How to Evaluate a Clinical Analytics Vendor: A ChecklistHow to Evaluate a Clinical Analytics Vendor: A Checklist
How to Evaluate a Clinical Analytics Vendor: A Checklist
 
MACRA and the New Quality Payment Program
MACRA and the New Quality Payment ProgramMACRA and the New Quality Payment Program
MACRA and the New Quality Payment Program
 
How to Drive ROI In Your Healthcare Quality Improvement Projects
How to Drive ROI In Your Healthcare Quality Improvement Projects How to Drive ROI In Your Healthcare Quality Improvement Projects
How to Drive ROI In Your Healthcare Quality Improvement Projects
 
Why Your Healthcare Business Intelligence Strategy Can't Win
Why Your Healthcare Business Intelligence Strategy Can't WinWhy Your Healthcare Business Intelligence Strategy Can't Win
Why Your Healthcare Business Intelligence Strategy Can't Win
 
Linking Clinical And Financial Data: The Key To Real Quality And Cost Out
Linking Clinical And Financial Data: The Key To Real Quality And Cost OutLinking Clinical And Financial Data: The Key To Real Quality And Cost Out
Linking Clinical And Financial Data: The Key To Real Quality And Cost Out
 
Clinical Data Repository vs. A Data Warehouse - Which Do You Need?
Clinical Data Repository vs. A Data Warehouse - Which Do You Need?Clinical Data Repository vs. A Data Warehouse - Which Do You Need?
Clinical Data Repository vs. A Data Warehouse - Which Do You Need?
 
4 Best Practices for Analyzing Healthcare Data
4 Best Practices for Analyzing Healthcare Data4 Best Practices for Analyzing Healthcare Data
4 Best Practices for Analyzing Healthcare Data
 
What is the best Healthcare Data Warehouse Model for Your Organization?
What is the best Healthcare Data Warehouse Model for Your Organization?What is the best Healthcare Data Warehouse Model for Your Organization?
What is the best Healthcare Data Warehouse Model for Your Organization?
 

Similar to Zimperium Global Threat Intelligence - Q2 2017

Protect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast MobileProtect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast MobileMarketingArrowECS_CZ
 
How Aetna Mitigated 701 Malware Infections on Mobile Devices
How Aetna Mitigated 701 Malware Infections on Mobile DevicesHow Aetna Mitigated 701 Malware Infections on Mobile Devices
How Aetna Mitigated 701 Malware Infections on Mobile DevicesSkycure
 
2019 04-18 -DevSecOps-software supply chain
2019 04-18 -DevSecOps-software supply chain2019 04-18 -DevSecOps-software supply chain
2019 04-18 -DevSecOps-software supply chainCameron Townshend
 
Infographic: The High Cost of BYOD
Infographic: The High Cost of BYODInfographic: The High Cost of BYOD
Infographic: The High Cost of BYODTrustwave
 
Infographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsInfographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsIBM Security
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the CloudAlert Logic
 
Security Implications of the Cloud - CSS Dallas Azure
Security Implications of the Cloud - CSS Dallas AzureSecurity Implications of the Cloud - CSS Dallas Azure
Security Implications of the Cloud - CSS Dallas AzureAlert Logic
 
Vetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security EssentialsVetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security EssentialsNowSecure
 
Everything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeepEverything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeepIvanti
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the CloudAlert Logic
 
Android stats v6 for threat report - Sophos
Android stats v6 for threat report - SophosAndroid stats v6 for threat report - Sophos
Android stats v6 for threat report - SophosITSitio.com
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecuritySubho Halder
 
Android security - an enterprise perspective
Android security -  an enterprise perspectiveAndroid security -  an enterprise perspective
Android security - an enterprise perspectivePietro F. Maggi
 
Istr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecIstr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecSoluciona Facil
 
A Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile MalwareA Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile MalwareIRJET Journal
 
Av is dead long live managed endpoint security
Av is dead   long live managed endpoint securityAv is dead   long live managed endpoint security
Av is dead long live managed endpoint securitySolarwinds N-able
 
Ce hv8 module 16 hacking mobile platforms
Ce hv8 module 16 hacking mobile platformsCe hv8 module 16 hacking mobile platforms
Ce hv8 module 16 hacking mobile platformsMehrdad Jingoism
 
State of Application Security: State of Piracy
State of Application Security: State of PiracyState of Application Security: State of Piracy
State of Application Security: State of PiracyIBM Security
 

Similar to Zimperium Global Threat Intelligence - Q2 2017 (20)

Protect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast MobileProtect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast Mobile
 
How Aetna Mitigated 701 Malware Infections on Mobile Devices
How Aetna Mitigated 701 Malware Infections on Mobile DevicesHow Aetna Mitigated 701 Malware Infections on Mobile Devices
How Aetna Mitigated 701 Malware Infections on Mobile Devices
 
2019 04-18 -DevSecOps-software supply chain
2019 04-18 -DevSecOps-software supply chain2019 04-18 -DevSecOps-software supply chain
2019 04-18 -DevSecOps-software supply chain
 
The State of the Net in India
The State of the Net in IndiaThe State of the Net in India
The State of the Net in India
 
Infographic: The High Cost of BYOD
Infographic: The High Cost of BYODInfographic: The High Cost of BYOD
Infographic: The High Cost of BYOD
 
Infographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsInfographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threats
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the Cloud
 
Security Implications of the Cloud - CSS Dallas Azure
Security Implications of the Cloud - CSS Dallas AzureSecurity Implications of the Cloud - CSS Dallas Azure
Security Implications of the Cloud - CSS Dallas Azure
 
Vetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security EssentialsVetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security Essentials
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Everything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeepEverything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeep
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the Cloud
 
Android stats v6 for threat report - Sophos
Android stats v6 for threat report - SophosAndroid stats v6 for threat report - Sophos
Android stats v6 for threat report - Sophos
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
Android security - an enterprise perspective
Android security -  an enterprise perspectiveAndroid security -  an enterprise perspective
Android security - an enterprise perspective
 
Istr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecIstr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantec
 
A Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile MalwareA Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile Malware
 
Av is dead long live managed endpoint security
Av is dead   long live managed endpoint securityAv is dead   long live managed endpoint security
Av is dead long live managed endpoint security
 
Ce hv8 module 16 hacking mobile platforms
Ce hv8 module 16 hacking mobile platformsCe hv8 module 16 hacking mobile platforms
Ce hv8 module 16 hacking mobile platforms
 
State of Application Security: State of Piracy
State of Application Security: State of PiracyState of Application Security: State of Piracy
State of Application Security: State of Piracy
 

Zimperium Global Threat Intelligence - Q2 2017

  • 1. 0All Rights Reserved © 2017 Zimperium Global Threat Intelligence Q2 2017 The Threat Is Real
  • 2. 1All Rights Reserved © 2017 Mobile OS is Constantly Changing Source: CVE.Mitre.org. CVEDetails.com: Android and iOS CVEs 0 100 200 300 400 500 600 700 800 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 CVE Score 7+ CVE Score 1-6 First half of 2017 nearly surpassed all of 2016
  • 3. 2All Rights Reserved © 2017 Device Risks 23% of iOS devices not updated despite update being available for 45 days 94% of Android devices not running latest 2 versions 23% 94% Source: Zimperium Global Threat Report Q2 2017 https://blog.zimperium.com/mobile-threat-data-q2-2017/
  • 4. 3All Rights Reserved © 2017 iOS Device Risks 23% of iOS devices not updated despite update being available for 45 days Approximately 1 of 4 devices are not running the latest security patches and introducing unnecessary risk Source: Zimperium Global Threat Report Q2 2017 https://blog.zimperium.com/mobile-threat-data-q2-2017/
  • 5. 4All Rights Reserved © 2017 Network Threats 5 % of devices detected a scan 80% of these devices detected a MITM Source: Zimperium Global Threat Report Q2 2017 https://blog.zimperium.com/mobile-threat-data-q2-2017/
  • 6. 5All Rights Reserved © 2017 1 of 50 iOS apps have severe privacy and security issues. App Threats • Malware • Shares Keychain • Weak Encryption • Private Dev Frameworks • Shares Private Info • Reads Device ID • Stores over USB Source: Zimperium Global Threat Report Q2 2017 https://blog.zimperium.com/mobile-threat-data-q2-2017/