SlideShare une entreprise Scribd logo
1  sur  19
SERIOUS THREAT OR FUD MACHINE?  THE MOBILE SECURITY DEBATE Daniel V. Hoffman CISSP, CHFI, CEH
MOBILE THREATS FEAR, UNCERTAINTY, DOUBT … AND CHARLATANS! “ IF you work for a company selling virus protection for android, rim or IOS, you should be ashamed of yourself.”  “ If you read a report from a vendor that tries to sell you something based on protecting android, rim or ios from viruses, they are also likely as not to be scammers and charlatans.”
JUST THE FACTS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Data obtained from:
JUNOS PULSE MOBILE THREAT CENTER ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MOBILE SECURITY – WHAT ARE THE THREATS? Copyright 2008 SMobile Systems Page  Mobile Security Threat Environment Malware –  Viruses, Worms,  Trojans, Spyware Direct Attack –   Attacking device interfaces, Network DoS, Malicious SMS Loss and Theft –  Accessing  sensitive data Data Communication Interception –  Sniffing data as it is transmitted and received Exploitation and Misconduct –  Online predators, pornography, inappropriate communications, data leakage
JUNIPER MOBILE THREAT REPORT TOTAL MOBILE MALWARE SAMPLES ACROSS ALL OPERATING SYSTEMS
AMOUNT OF MALWARE SAMPLES  DISCLOSED PER VENDOR
AMOUNT OF ANDROID MALWARE  SAMPLES DISCLOSED PER VENDOR
JUNIPER MOBILE THREAT REPORT UNIQUE MOBILE MALWARE SAMPLES DETECTED BY OPERATING SYSTEM
JUNIPER MOBILE THREAT REPORT TYPES OF MALWARE  TARGETING MOBILE DEVICES FAKE INSTALLER VS.  ALL OTHER ANDROID MALWARE
JUNIPER MOBILE THREAT REPORT CUMULATIVE ANDROID  MALWARE INCREASE MARKET SHARE OF SMARTPHONE SUBSCRIBERS BY PLATFORM
JUNIPER MOBILE THREAT REPORT 2011 NOTABLE EVENTS
WHAT IS A FAKE INSTALLER?
JUNIPER MOBILE THREAT REPORT REMOTE DEVICE MANAGEMENT: INCIDENCE OF CAPABILITIES USED
JUNIPER MOBILE THREAT REPORT – WI-FI SNIFFING
GOOGLE "BOUNCER" ANDROID MARKET SCANNING ,[object Object],[object Object],[object Object],[object Object],[object Object]
PROTECTING AGAINST A MOBILE ATTACK LAN 1  On-device Zero Day Protection stops malware on the device 2  IDS signatures detect malicious network traffic on network 3  NAC (Network Access Control) at Juniper SAs to deny insecure devices access to network resources 4  Shared Threat knowledge enables firewall rules to block network traffic destined for spyware server. ‘ DroidDream Zero-day at the handset RAN CARRIER NETWORK SRX/IDS/IPS ENTERPRISE NETWORK NAC (Network Access Control) at Juniper SAs
QUESTIONS FOR THE AUDIENCE Do you have mobile security software installed  on your device? Has your company suffered a mobile security incident? Does your company have an official security policy for mobile devices?
 

Contenu connexe

Plus de Juniper Networks

Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachSecuring IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachJuniper Networks
 
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?Juniper Networks
 
Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?Juniper Networks
 
Juniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper Networks
 
SDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider OrganizationSDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider OrganizationJuniper Networks
 
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveNavigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveJuniper Networks
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks Juniper Networks
 
NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud Juniper Networks
 
Juniper SRX5800 Infographic
Juniper SRX5800 InfographicJuniper SRX5800 Infographic
Juniper SRX5800 InfographicJuniper Networks
 
Infographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionInfographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionJuniper Networks
 
Infographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastInfographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastJuniper Networks
 
High performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingHigh performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingJuniper Networks
 
What Are Virtual Chassis and Virtual Chassis Fabric?
What Are Virtual Chassis and Virtual Chassis Fabric?What Are Virtual Chassis and Virtual Chassis Fabric?
What Are Virtual Chassis and Virtual Chassis Fabric?Juniper Networks
 
MetaFabric Architectures 1.0 - Virtualized IT Data Center
MetaFabric Architectures 1.0 - Virtualized IT Data CenterMetaFabric Architectures 1.0 - Virtualized IT Data Center
MetaFabric Architectures 1.0 - Virtualized IT Data CenterJuniper Networks
 
WAN Solution Meets The Challenges Of The Large Enterprise Solution Brief
WAN Solution Meets The Challenges Of The Large Enterprise Solution BriefWAN Solution Meets The Challenges Of The Large Enterprise Solution Brief
WAN Solution Meets The Challenges Of The Large Enterprise Solution BriefJuniper Networks
 
Juniper Networks: Converged SuperCore Infographic
Juniper Networks: Converged SuperCore Infographic Juniper Networks: Converged SuperCore Infographic
Juniper Networks: Converged SuperCore Infographic Juniper Networks
 
Juniper switching infographic_final_0415[2]
Juniper switching infographic_final_0415[2]Juniper switching infographic_final_0415[2]
Juniper switching infographic_final_0415[2]Juniper Networks
 
The Case for Disaggregation of Compute in the Data Center
The Case for Disaggregation of Compute in the Data CenterThe Case for Disaggregation of Compute in the Data Center
The Case for Disaggregation of Compute in the Data CenterJuniper Networks
 
Cloud Analytics Engine Value - Juniper Networks
Cloud Analytics Engine Value - Juniper Networks Cloud Analytics Engine Value - Juniper Networks
Cloud Analytics Engine Value - Juniper Networks Juniper Networks
 

Plus de Juniper Networks (20)

Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachSecuring IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic Approach
 
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
 
What's Your IT Alter Ego?
What's Your IT Alter Ego?What's Your IT Alter Ego?
What's Your IT Alter Ego?
 
Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?
 
Juniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCO
 
SDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider OrganizationSDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider Organization
 
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveNavigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks
 
NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud
 
Juniper SRX5800 Infographic
Juniper SRX5800 InfographicJuniper SRX5800 Infographic
Juniper SRX5800 Infographic
 
Infographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionInfographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer Satisfaction
 
Infographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastInfographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning Fast
 
High performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingHigh performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computing
 
What Are Virtual Chassis and Virtual Chassis Fabric?
What Are Virtual Chassis and Virtual Chassis Fabric?What Are Virtual Chassis and Virtual Chassis Fabric?
What Are Virtual Chassis and Virtual Chassis Fabric?
 
MetaFabric Architectures 1.0 - Virtualized IT Data Center
MetaFabric Architectures 1.0 - Virtualized IT Data CenterMetaFabric Architectures 1.0 - Virtualized IT Data Center
MetaFabric Architectures 1.0 - Virtualized IT Data Center
 
WAN Solution Meets The Challenges Of The Large Enterprise Solution Brief
WAN Solution Meets The Challenges Of The Large Enterprise Solution BriefWAN Solution Meets The Challenges Of The Large Enterprise Solution Brief
WAN Solution Meets The Challenges Of The Large Enterprise Solution Brief
 
Juniper Networks: Converged SuperCore Infographic
Juniper Networks: Converged SuperCore Infographic Juniper Networks: Converged SuperCore Infographic
Juniper Networks: Converged SuperCore Infographic
 
Juniper switching infographic_final_0415[2]
Juniper switching infographic_final_0415[2]Juniper switching infographic_final_0415[2]
Juniper switching infographic_final_0415[2]
 
The Case for Disaggregation of Compute in the Data Center
The Case for Disaggregation of Compute in the Data CenterThe Case for Disaggregation of Compute in the Data Center
The Case for Disaggregation of Compute in the Data Center
 
Cloud Analytics Engine Value - Juniper Networks
Cloud Analytics Engine Value - Juniper Networks Cloud Analytics Engine Value - Juniper Networks
Cloud Analytics Engine Value - Juniper Networks
 

Dernier

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 

Dernier (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Serious Threat or FUD Machine? The Mobile Security Debate

  • 1. SERIOUS THREAT OR FUD MACHINE? THE MOBILE SECURITY DEBATE Daniel V. Hoffman CISSP, CHFI, CEH
  • 2. MOBILE THREATS FEAR, UNCERTAINTY, DOUBT … AND CHARLATANS! “ IF you work for a company selling virus protection for android, rim or IOS, you should be ashamed of yourself.” “ If you read a report from a vendor that tries to sell you something based on protecting android, rim or ios from viruses, they are also likely as not to be scammers and charlatans.”
  • 3.
  • 4.
  • 5. MOBILE SECURITY – WHAT ARE THE THREATS? Copyright 2008 SMobile Systems Page Mobile Security Threat Environment Malware – Viruses, Worms, Trojans, Spyware Direct Attack – Attacking device interfaces, Network DoS, Malicious SMS Loss and Theft – Accessing sensitive data Data Communication Interception – Sniffing data as it is transmitted and received Exploitation and Misconduct – Online predators, pornography, inappropriate communications, data leakage
  • 6. JUNIPER MOBILE THREAT REPORT TOTAL MOBILE MALWARE SAMPLES ACROSS ALL OPERATING SYSTEMS
  • 7. AMOUNT OF MALWARE SAMPLES DISCLOSED PER VENDOR
  • 8. AMOUNT OF ANDROID MALWARE SAMPLES DISCLOSED PER VENDOR
  • 9. JUNIPER MOBILE THREAT REPORT UNIQUE MOBILE MALWARE SAMPLES DETECTED BY OPERATING SYSTEM
  • 10. JUNIPER MOBILE THREAT REPORT TYPES OF MALWARE TARGETING MOBILE DEVICES FAKE INSTALLER VS. ALL OTHER ANDROID MALWARE
  • 11. JUNIPER MOBILE THREAT REPORT CUMULATIVE ANDROID MALWARE INCREASE MARKET SHARE OF SMARTPHONE SUBSCRIBERS BY PLATFORM
  • 12. JUNIPER MOBILE THREAT REPORT 2011 NOTABLE EVENTS
  • 13. WHAT IS A FAKE INSTALLER?
  • 14. JUNIPER MOBILE THREAT REPORT REMOTE DEVICE MANAGEMENT: INCIDENCE OF CAPABILITIES USED
  • 15. JUNIPER MOBILE THREAT REPORT – WI-FI SNIFFING
  • 16.
  • 17. PROTECTING AGAINST A MOBILE ATTACK LAN 1 On-device Zero Day Protection stops malware on the device 2 IDS signatures detect malicious network traffic on network 3 NAC (Network Access Control) at Juniper SAs to deny insecure devices access to network resources 4 Shared Threat knowledge enables firewall rules to block network traffic destined for spyware server. ‘ DroidDream Zero-day at the handset RAN CARRIER NETWORK SRX/IDS/IPS ENTERPRISE NETWORK NAC (Network Access Control) at Juniper SAs
  • 18. QUESTIONS FOR THE AUDIENCE Do you have mobile security software installed on your device? Has your company suffered a mobile security incident? Does your company have an official security policy for mobile devices?
  • 19.