what is a mobile threat?

19
WHAT IS A MOBILE THREAT? By Lookout, Inc.

Upload: lookout

Post on 15-Jan-2015

7.061 views

Category:

Technology


3 download

DESCRIPTION

Like viruses and spyware that can infect your PC, there are a variety of security threats that can affect mobile devices.

TRANSCRIPT

Page 4: What is a Mobile Threat?

APP-BASEDTHREATSMalware

Spyware

Privacy Threats

Vulnerable Applications

PHYSICALTHREATS

NETWORKTHREATS

WEB-BASEDTHREATS

“Malicious apps” may look fine on a download site, but they are specifically designed to commit fraud.

Page 5: What is a Mobile Threat?

Malwareis software that performs malicious actions while installed on your phone.

• make charges to your phone bill

• send unsolicited messages to your contact list

• give an attacker control over your device

Without your knowledge,

malware can:

Page 6: What is a Mobile Threat?

Spywareis designed to collect or use private data without your knowledge or approval.

Data commonly targeted by spyware includes phone call history, text messages, user location, browser history, contact list, email, and private photos. This stolen information could

be used for identity theft or financial fraud.

Page 7: What is a Mobile Threat?

Privacy Threatsmay be caused by applications that are not necessarily malicious, but gather or use sensitive information — like location, contact lists, and personally identifiable information — than is necessary to perform their function.

Page 8: What is a Mobile Threat?

Vulnerable Applicationsare apps that contain flaws which can be exploited for malicious purposes.

Such vulnerabilities allow an attacker to access sensitive information, perform undesirable actions, stop a service from functioning correctly,

or download apps to your device without your knowledge.

Page 9: What is a Mobile Threat?

APP-BASEDTHREATS

PHYSICALTHREATS

NETWORKTHREATS

WEB-BASEDTHREATSPhishing Scams

Drive-by Downloads

Browser Exploits

Because mobile devices are constantly connected to the Internet and frequently used to access web-based services, web-based threats pose

persistent issues for mobile devices.

Page 10: What is a Mobile Threat?

Often these messagesand sites are very difficult to distinguish from those of your bank or other legitimate sources.

Phishing Scamsuse email, text messages, Facebook, and Twitter to send you links to websites that are designed to trick you into

providing information like passwords or account numbers.

Page 12: What is a Mobile Threat?

Simply by visiting an

unsafe web page, you can trigger a browser exploit that can install malware or perform

other actions on your device.

Browser Exploitstake advantage of vulnerabilities in your mobile web browser or software launched by the browser such as a Flash player, PDF reader, or image viewer.

Page 13: What is a Mobile Threat?

APP-BASEDTHREATS

PHYSICALTHREATS

NETWORKTHREATSNetwork Exploits

WiFi Sniffing

WEB-BASEDTHREATS

Mobile devices typically support cellular networks as well as local wireless networks like WiFi and Bluetooth, which can open the door to threats.

Page 14: What is a Mobile Threat?

Once connected, they can

install malware on your phone without your

knowledge.Network Exploitstake advantage of flaws in the mobile operating system or other software that operates on local or cellular networks.

Page 15: What is a Mobile Threat?

Many applications and web pages do not use proper security measures, sending unencrypted data across the network that can be easily read by someone who

is grabbing data as it travels.

WiFi Sniffingintercepts data as it is traveling through the air between the device and the WiFi access point.

Page 16: What is a Mobile Threat?

APP-BASEDTHREATS

PHYSICALTHREATSLost or Stolen Devices

NETWORKTHREATS

WEB-BASEDTHREATS

Mobile devices are small, valuable and we carry them everywhere with us, so their physical security is also an important consideration.

Page 17: What is a Mobile Threat?

Lost or Stolen Devicesare one of the most prevalent mobile threats.

The mobile device is valuable not only because the hardware itself can be re-sold, but more importantly because of the sensitive

personal and organization information it may contain.

Page 18: What is a Mobile Threat?

• Set a passcode on your phone

• Download software updates

• Be cautious when downloading apps

• Stick to window-shopping on public WiFi

• Protect your phone like you protect your PC

• Download Lookout to protect your devices

You can protect yourself with these tips: