Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Mobile Threats at the Tipping Point, Jan Volzke, McAfee
1. Mobile Threats at the Tipping Point Jan Volzke Director, Product Management McAfee, Inc. June 2011
2. Mobile Malware Trend and Outlook - A new Generation of Malware Writers Mobile Threat Research McAfee, Inc., June 2011 Mobile Threats at the Tipping Point, Jan Volzke 2
3.
4. Why Mobile Threats are Expected to Rise - Key Accelerating Trends User Aggregation 2015 OS shipments IDCJune’11 Protection Gap Mobile Money Reliance on User Alternative Access Sensitivity of Data Mobile Threats at the Tipping Point, Jan Volzke 4
5. Mobile Malware Life Cycle- Show me the Money R&D Reuse Profit Taking Mobile malware monetization methods: Sell stolen information, Premium SMS/Calls, Click Fraud, Traffic generation, Cash out account balances, Malware for sale, Subscription scams, Mobile banking attacks, Ransom ware extortion, Resell pirated apps Mobile Threats at the Tipping Point, Jan Volzke 5
18. The attacker gains access to the victim’s bank accountMcAfee Global Threat Report Q1’2011 Opening the page on a PC browser unveils a dubious URL Mobile Threats at the Tipping Point, Jan Volzke 7
25. Questions? Advertisement Contact: Jan Volzke McAfee, Inc. Jan_Volzke@mcafee.com Comprehensive Protection Against Viruses, Data Loss and Web Threats http://McAfeeMobileSecurity.com Mobile Threats at the Tipping Point 9
26.
Editor's Notes
Developers:Enable field patches Confuscate source codeTransparent data useInvest in security testingUse third party trust marksEnterprises:Understand your mobile security riskEnforce IT-policies across devicesEducate users and customers Offer complimentary protection Individuals:Apply common sense Protect yourself against:Mobile viruses and SpywareWeb based Phishing attacksDevice and Data LossManufacturers:MS need not agreement from OEM’s to patchDecouple customization from OS updatesReduce OS update cycle to 7 daysEnhance security features, esp. authenticationPreload complimentary securityCarriers:Protect key assets (location, subs data, billing)Work with OEMs to shorten update cyclesUse network to solve most security issuesAppStores:Security gate keeper, final resortIf nothing than intense security testingUse Trustmarks to show users safe appsEnable revocation of apps in field