mobile computing threats

12
Mobile Computing Threats Exposure, Exploit and Opportunity = Attack David Michael Perry Global Director of Education – Trend Micro, Inc.

Upload: interop

Post on 18-Nov-2014

1.137 views

Category:

Education


2 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Mobile computing threats

Mobile Computing Threats

Exposure, Exploit and Opportunity = Attack

David Michael Perry

Global Director of Education – Trend Micro, Inc.

Page 2: Mobile computing threats

EVERY YEAR

• Systems are more powerful

• Systems are faster

• Systems are smaller

• Systems are more connected

• Systems are more mobile

• Systems are victims

Page 3: Mobile computing threats

= Symbian OS (Nokia, etc)

= Windows Mobile (HP iPAQ, etc)

= Java (J2ME)

2004 2005 2006

RedBrow

Vlasco

Win CE BRADO

R

29Dec04

1Feb05

Locknut (Gavno)

21Nov04

Skulls20June0

4Cabir

17Jul04

5Aug04

Win CE DUTS

8Mar05

Comwar7Mar05

Dampig

12Aug04

Qdial

4Apr05Mabir

Fontal

6Apr05Drever

18Mar05

Hobbes15Apr05

Doomed4Jul05

Boottoon

8Jul05

Skudoo

19Jul05

Cadmesk

21Sep05

Cardtrp

2Oct05Cardblk

23Nov05PBSteal

Blanfon10Aug05

19Jul05

Sndtool

28Feb06

15Mar06

30Mar06Flexspy

3Apr06

OneJump

18Jun06Romride

31Aug06Mobler

Wesber

7Sep06

4Sep06Acallno

23Jan06

Cxover1Dec06Mrex

14Nov06Comdrop

10Mar07Feakks

10Mar07Feaks

21May07Viver

12Jun07Mpofeli

Note: Chart includes new malware strains, does not include variants

2007 2008

Flexspy

11Jul07

Beselo

23Jan08

4Feb08Smsany

29Feb08Infojack

28Feb08Hathat

28Feb08Fonzi Kiazha

5Mar08

5Mar08Dropper

This is NOT the problem

Page 4: Mobile computing threats

This is part of the problem

Page 5: Mobile computing threats

This is a BIGGER PART of the problem

Source: Argonne National Laboratory, Nuclear Engineering Division, Vulnerability Assessment Team (VAT)

http://www.ne.anl.gov/capabilities/vat/seals/maxims.html

Page 6: Mobile computing threats

The data is moving into mobile, as is the connectivity

Page 7: Mobile computing threats

The main advantage in mobile

Page 8: Mobile computing threats

Threats To Enterprise Devices

Compromised data at rest

Block hacking, intrusions, malware

Compromised Data

Compromised data in motion

Countermeasures–SSL/VPN

Countermeasures–Encryption

–Authentication–Firewall

Countermeasures–Firewall/IDS

–Antivirus/anti-spyware

Impaired Productivity

Page 9: Mobile computing threats

The Problem

• Information (DATA)  is property

• YOUR DATA is out in the world, in mobile devices, out of your protection and control

• New threats always arise suiting the newest medium of information exchange.

• Social Networks

• There are bad guys out there.

Page 10: Mobile computing threats

And yet, the process accelerates

Page 11: Mobile computing threats

There is a light at the end of the tunnel

Page 12: Mobile computing threats

Think mobile devices are safe?Think again!

To find out more about protecting mobile devices go to www.trendmicro.com