Beruflich Dokumente
Kultur Dokumente
• Symbian
• Windows Mobile
• iPhone
• Android
• Palm
"The smartphone OS will become a major security target," said Android Security Leader
Rich Cannings.
"We wanted developers to be able to upload their applications without anyone stopping
them from doing that," Cannings said. "Unfortunately this opens us up to malware."
Page 5
Identity Theft Moves to Mobile
• Identity theft is the Number 1 consumer crime in America¹
• 5 million U.S. consumers lost money to phishing attacks in 2008 - a 40% increase for that
period¹
• SMS (text) messaging is now the second leading conduit for phishing attacks¹
• 40% of users who store credit card information on their handset do not have a basic
password on the device to limit entry ²
¹ - Gartner Research
² - Credant Technologies
6
Page 6
Mobile Banking is on the Rise
Page 10
• Smartphones are rapidly replacing feature
phones. Analyst predictions state that by 2012,
65% of all cell phone sales will be smartphones
• Authentication/Identity
Spoofing and Sniffing –
Accessing resources with a
user’s identity or credentials
Spyware Capabilities:
• Intercept and post to a website every
SMS, MMS and e-mail (see image)
• Track every key typed by the device “Users and enterprises who are waiting to experience an infection before
implementing security software are placing themselves into the unsavory
• Remotely and silently turn on the position of unknowingly becoming infected with Spyware and having
phone to hear ambient conversations absolutely no security software in place to address that infection.”
– SMobile Global Threat Center
• Track the position of the device
Sniffed Packets
118 and 140
Page
Page 27
27 Copyright 2009Copyright 2008 SMobile Systems
SMobile Systems
iPhone “Encryption”
Enterprises:
• Where is your data going?
• What is your employee e-mailing, storing on
their phone, texting?
• What pictures are employees taking; Data
Leakage Protection
• What websites are being visited with the
company device? You control your PCs, why
not your smartphones?
• Ethicalhacker.net
• BlackJacking Book