SlideShare une entreprise Scribd logo
1  sur  20
CELLPHONE VIRUS AND
BY
SECURITY
HIMANSHU KUMAR
REG.NO:-U11CS056
INTRODUCTION

2
Smart Phones ‘R Pocket
Computers

 Most commonly used phones, as defined

by operating system (OS) –
 Android (Android OS)
 BlackBerry (RIM OS)
 iPhones / iPod touch (iPhone OS)
 PalmPre (WebOS)
 Windows Mobile (WinMobile OS)

3
Current threats by mobile malware


For financial gain / loss









Unnecessary calls / SMS / MMS
Send and sell private information

Cause phones to work slowly or crash
Wipe out contact books and other information on
the phone
Install “false” applications
Internet, Bluetooth, and MMS
 In all of these transfer methods, the user has

to agree at least once to run the infected file
 But smart phone virus writters get you to
open and install their product the same way
computer virus writers do:
 The virus is typically disguised as a game,
security patch or other desirable application

5
Viruses and Smart Phones
 How smart phone viruses spread –
 Internet downloads
 Bluetooth
 Multimedia Messaging System (MMS)

 Only smart phones susceptible to viruses
 Phones that can only make and receive calls are
not at risk

6
HISTORY
iPhone SMS attack first took place in July 2009
We trust smart phones & think they are safe
We have the mistaken sense they are immune to security
threats
Smart phones typically lack security features, like antivirus,
found on other computers

7
Classification of
Mobile Viruses
Classification
Behaviour

Virus

Worm

Trojan

Environment

Operating System

Vulnerable Application

:secrL yksr eps a K
ba uo S

Classification (examples)

Mobile Worms and Viruses

31st October 2006
Case Studies
Case Study – CABIR
First mobile worm

Spread vector – Bluetooth

Infected file – caribe.sis

15 new variants exist

Case Study - ComWar
Second landmark in mobile worms

Spread vector - Bluetooth and MMS

Large spread area due to MMS

Not as proof of concept – Intention to harm by
charging the mobile user

Multiple variants detected

Case Study - CardTrap
First cross-over mobile virus found

Can migrate from mobile to PC

Propogates as infected mobile application as well
as Windows worm

2 variants found

Protective Measures
Securing against attacks
System level security

MOSES

Network Level Security

Proactive approach

Lock Down Bluetooth!
 Bluetooth is default-on
 Wastes your battery
 Leaves you open to Bluetooth-based attacks

– most common at this time

17
Secure an iPhone
 Auto-Lock locks the touch screen for a preset

time period after not being used for one, two,
three, four or five minutes. Turned on by
default but can be disabled altogether
 Password-protect the SIM card on a 3G
 The Erase Data function lets you completely
wipe your iPhone after 10 failed passcode
attempts

18
Social Engineering Threats
 The best security in the world will not help

you if –
 You click on an phishing email and give your
personal information
 You click on a SMS/text message that
appears to come from your carrier
 You respond to a vishing phone call*
 Never give information via email or by phone
or on the web, unless you initiate the
exchange

19
Threats to Smart Phones
 Attackers will exploit our social conditioning

entering Personally Identifiable Information
(PI/PII), while interacting with phone voice
response to commit vishing and identity theft.1

 We demand more and better availability from

phone service than we would from an ISP, “so
the threat of a DoS attack might compel
carriers to pay out on a blackmail scam.”1

 “At this point, mobile device capability is far

ahead of security… We’ll start to see the botnet
problem infiltrate the mobile world in 2012.”2
20

Contenu connexe

Tendances

Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device securityCAS
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsJimmy Shah
 
Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile networkRAVITEJA828
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
9. cellphone hardening (cyber awareness series)
9. cellphone hardening (cyber awareness series)9. cellphone hardening (cyber awareness series)
9. cellphone hardening (cyber awareness series)Isaac Feliciano
 
Mobile security
Mobile securityMobile security
Mobile securityhome
 
Authentication service security
Authentication service securityAuthentication service security
Authentication service securityG Prachi
 
Why you need antivirus protection on your smartphone
Why you need antivirus protection on your smartphoneWhy you need antivirus protection on your smartphone
Why you need antivirus protection on your smartphoneBrian Gongol
 
Mobile protection
Mobile protection Mobile protection
Mobile protection preetpatel72
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber SecurityGeo Marian
 
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)Svetlin Nakov
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkBlue Coat
 
Mobile device security
Mobile device securityMobile device security
Mobile device securityLisa Herrera
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone securityManish Gupta
 
Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)
Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)
Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)Svetlin Nakov
 

Tendances (20)

Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
 
Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile network
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
9. cellphone hardening (cyber awareness series)
9. cellphone hardening (cyber awareness series)9. cellphone hardening (cyber awareness series)
9. cellphone hardening (cyber awareness series)
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Authentication service security
Authentication service securityAuthentication service security
Authentication service security
 
Why you need antivirus protection on your smartphone
Why you need antivirus protection on your smartphoneWhy you need antivirus protection on your smartphone
Why you need antivirus protection on your smartphone
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You Think
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 
Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)
Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)
Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)
 
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
 
Mobile security
Mobile security Mobile security
Mobile security
 

Similaire à Him

Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Securitymanish kumar
 
16 tips to thwart mobile security threats
16 tips to thwart mobile security threats16 tips to thwart mobile security threats
16 tips to thwart mobile security threatsJohn Gibson
 
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxmobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxvrandmandora1
 
MOBILE SECURITY.pptx
MOBILE SECURITY.pptxMOBILE SECURITY.pptx
MOBILE SECURITY.pptxKakshaPatel3
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threatAli J
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and securityAjay Singh
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesBee_Ware
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catchiYogi
 
Attacks on Mobile Devices by Nitish.pptx
Attacks on Mobile Devices by Nitish.pptxAttacks on Mobile Devices by Nitish.pptx
Attacks on Mobile Devices by Nitish.pptxNitishChoudhary23
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 

Similaire à Him (20)

Cp3201 mobile security final
Cp3201 mobile security finalCp3201 mobile security final
Cp3201 mobile security final
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
16 tips to thwart mobile security threats
16 tips to thwart mobile security threats16 tips to thwart mobile security threats
16 tips to thwart mobile security threats
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxmobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
 
MOBILE SECURITY.pptx
MOBILE SECURITY.pptxMOBILE SECURITY.pptx
MOBILE SECURITY.pptx
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
 
Top 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOSTop 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOS
 
Mobile Malware
Mobile MalwareMobile Malware
Mobile Malware
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobiles
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
CyberCrime attacks on Small Businesses
CyberCrime attacks on Small BusinessesCyberCrime attacks on Small Businesses
CyberCrime attacks on Small Businesses
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
Attacks on Mobile Devices by Nitish.pptx
Attacks on Mobile Devices by Nitish.pptxAttacks on Mobile Devices by Nitish.pptx
Attacks on Mobile Devices by Nitish.pptx
 
M
MM
M
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 

Dernier

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

Him

  • 3. Smart Phones ‘R Pocket Computers  Most commonly used phones, as defined by operating system (OS) –  Android (Android OS)  BlackBerry (RIM OS)  iPhones / iPod touch (iPhone OS)  PalmPre (WebOS)  Windows Mobile (WinMobile OS) 3
  • 4. Current threats by mobile malware  For financial gain / loss      Unnecessary calls / SMS / MMS Send and sell private information Cause phones to work slowly or crash Wipe out contact books and other information on the phone Install “false” applications
  • 5. Internet, Bluetooth, and MMS  In all of these transfer methods, the user has to agree at least once to run the infected file  But smart phone virus writters get you to open and install their product the same way computer virus writers do:  The virus is typically disguised as a game, security patch or other desirable application 5
  • 6. Viruses and Smart Phones  How smart phone viruses spread –  Internet downloads  Bluetooth  Multimedia Messaging System (MMS)  Only smart phones susceptible to viruses  Phones that can only make and receive calls are not at risk 6
  • 7. HISTORY iPhone SMS attack first took place in July 2009 We trust smart phones & think they are safe We have the mistaken sense they are immune to security threats Smart phones typically lack security features, like antivirus, found on other computers 7
  • 10. :secrL yksr eps a K ba uo S Classification (examples) Mobile Worms and Viruses 31st October 2006
  • 12. Case Study – CABIR First mobile worm  Spread vector – Bluetooth  Infected file – caribe.sis  15 new variants exist 
  • 13. Case Study - ComWar Second landmark in mobile worms  Spread vector - Bluetooth and MMS  Large spread area due to MMS  Not as proof of concept – Intention to harm by charging the mobile user  Multiple variants detected 
  • 14. Case Study - CardTrap First cross-over mobile virus found  Can migrate from mobile to PC  Propogates as infected mobile application as well as Windows worm  2 variants found 
  • 16. Securing against attacks System level security  MOSES  Network Level Security  Proactive approach 
  • 17. Lock Down Bluetooth!  Bluetooth is default-on  Wastes your battery  Leaves you open to Bluetooth-based attacks – most common at this time 17
  • 18. Secure an iPhone  Auto-Lock locks the touch screen for a preset time period after not being used for one, two, three, four or five minutes. Turned on by default but can be disabled altogether  Password-protect the SIM card on a 3G  The Erase Data function lets you completely wipe your iPhone after 10 failed passcode attempts 18
  • 19. Social Engineering Threats  The best security in the world will not help you if –  You click on an phishing email and give your personal information  You click on a SMS/text message that appears to come from your carrier  You respond to a vishing phone call*  Never give information via email or by phone or on the web, unless you initiate the exchange 19
  • 20. Threats to Smart Phones  Attackers will exploit our social conditioning entering Personally Identifiable Information (PI/PII), while interacting with phone voice response to commit vishing and identity theft.1  We demand more and better availability from phone service than we would from an ISP, “so the threat of a DoS attack might compel carriers to pay out on a blackmail scam.”1  “At this point, mobile device capability is far ahead of security… We’ll start to see the botnet problem infiltrate the mobile world in 2012.”2 20