mobile computing threats
DESCRIPTION
TRANSCRIPT
Mobile Computing Threats
Exposure, Exploit and Opportunity = Attack
David Michael Perry
Global Director of Education – Trend Micro, Inc.
EVERY YEAR
• Systems are more powerful
• Systems are faster
• Systems are smaller
• Systems are more connected
• Systems are more mobile
• Systems are victims
= Symbian OS (Nokia, etc)
= Windows Mobile (HP iPAQ, etc)
= Java (J2ME)
2004 2005 2006
RedBrow
Vlasco
Win CE BRADO
R
29Dec04
1Feb05
Locknut (Gavno)
21Nov04
Skulls20June0
4Cabir
17Jul04
5Aug04
Win CE DUTS
8Mar05
Comwar7Mar05
Dampig
12Aug04
Qdial
4Apr05Mabir
Fontal
6Apr05Drever
18Mar05
Hobbes15Apr05
Doomed4Jul05
Boottoon
8Jul05
Skudoo
19Jul05
Cadmesk
21Sep05
Cardtrp
2Oct05Cardblk
23Nov05PBSteal
Blanfon10Aug05
19Jul05
Sndtool
28Feb06
15Mar06
30Mar06Flexspy
3Apr06
OneJump
18Jun06Romride
31Aug06Mobler
Wesber
7Sep06
4Sep06Acallno
23Jan06
Cxover1Dec06Mrex
14Nov06Comdrop
10Mar07Feakks
10Mar07Feaks
21May07Viver
12Jun07Mpofeli
Note: Chart includes new malware strains, does not include variants
2007 2008
Flexspy
11Jul07
Beselo
23Jan08
4Feb08Smsany
29Feb08Infojack
28Feb08Hathat
28Feb08Fonzi Kiazha
5Mar08
5Mar08Dropper
This is NOT the problem
This is part of the problem
This is a BIGGER PART of the problem
Source: Argonne National Laboratory, Nuclear Engineering Division, Vulnerability Assessment Team (VAT)
http://www.ne.anl.gov/capabilities/vat/seals/maxims.html
The data is moving into mobile, as is the connectivity
The main advantage in mobile
Threats To Enterprise Devices
Compromised data at rest
Block hacking, intrusions, malware
Compromised Data
Compromised data in motion
Countermeasures–SSL/VPN
Countermeasures–Encryption
–Authentication–Firewall
Countermeasures–Firewall/IDS
–Antivirus/anti-spyware
Impaired Productivity
The Problem
• Information (DATA) is property
• YOUR DATA is out in the world, in mobile devices, out of your protection and control
• New threats always arise suiting the newest medium of information exchange.
• Social Networks
• There are bad guys out there.
And yet, the process accelerates
There is a light at the end of the tunnel
Think mobile devices are safe?Think again!
To find out more about protecting mobile devices go to www.trendmicro.com