NADAV PELEG HEAD OF MOBILE SECURITY The Mobile Threat: Consumer Devices Business Risks David Parkinson MOBILE SECURITY SPECIALIST, NER.

Slides:



Advertisements
Similar presentations
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Advertisements

Win the Cyberwar on Mobile Banking and Payments
Supplied on \web site. on January 10 th, 2008 Customer Security Management Reducing Internet fraud June 1 st, 2008 eSAC Walk Thru © Copyright Prevx Limited.
By Hiranmayi Pai Neeraj Jain
Security for Today’s Threat Landscape Kat Pelak 1.
AmadeusCybersecurity: the essentials12 th November 2014 Alex van Someren Family Office Forum 12 th November 2014, Zurich Cybersecurity: the essentials.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Latest Threats Against Mobile Devices Dave Jevans Founder, Chairman and CTO.
TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
#AVeSPresents AVeS Cyber Security Confidence in your Digital Information 2014/09/25 Charl Ueckermann Managing Director AVeS Cyber Security Lex Informatica.
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Trojan Horse Program Presented by : Lori Agrawal.
Cyber X-Force-SMS alert system for threats.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
IBM Security Network Protection (XGS)
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Quiz Review.
Norman SecureSurf Protect your users when surfing the Internet.
Chapter Nine Maintaining a Computer Part III: Malware.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
Presentation By Deepak Katta
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Introduction to Mobile Malware
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
All Your Droid Are Belong To Us: A Survey of Current Android Attacks 단국대학교 컴퓨터 보안 및 OS 연구실 김낙영
IT security By Tilly Gerlack.
Click to edit Master title style Click to edit Master text styles Second level Third level Fourth level Fifth level June 10 th, 2009Event details (title,
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
THE THREAT LANDSCAPE FROM CYBERCRIME TO CYBER-WAR David Emm Global Research and Analysis Team.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Topic 5: Basic Security.
HOW TO PREVENT IDENTITY THEFT ONLINE TIPS 1.WATCH OUT FOR PHISHING WEBSITES.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Winning with Check point
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
MobileSecurity Vulnerability Assessment Tools for the Enterprise Mobile Security Vulnerability Assessment Tools for the Enterprise Integrating Mobile/BYOD.
Computer Security By Duncan Hall.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Policies and Security for Internet Access
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Android and IOS Permissions Why are they here and what do they want from me?
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
1. Definition : Malicious code refers to a program that is covertly inserted into another program with the intent to Malicious activities. 2.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Ilija Jovičić Sophos Consultant.
Public Facilities and Cyber Security
Authentication 2.0: User Generated Security
4 ways to stay safe online 1. Avoid viruses and phishing scams
Intercept X for Server Early Access Program Sophos Tester
Home Internet Vulnerabilities
Security in mobile technologies
Wireless Spoofing Attacks on Mobile Devices
Presentation transcript:

NADAV PELEG HEAD OF MOBILE SECURITY The Mobile Threat: Consumer Devices Business Risks David Parkinson MOBILE SECURITY SPECIALIST, NER

©2015 Check Point Software Technologies Ltd. 2 ​ Over arching themes of the moment: IBM estimate that in 2016 there will be more mobile devices on the planet than human beings State of the nation The macro back drop of everything we are talking about today is an explosion of technology adoption and consumerisation of IT

3 VECTORS OF Network AttacksOS ExploitsInfected Apps

TURN ON THE MICROPHONE TURN ON THE CAMERA TRACK DEVICE LOCATION CAPTURE S EXTRACT DATA STEAL USERNAME & PASSWORD

©2015 Check Point Software Technologies Ltd. 5 Ideal victim  unprotected  always connected  accesses valuable personal and business data using credentials for company resources

MAJOR ATTACKS

Legit app developers Infected XCode compiler Injection during compilation Apple failed to block infected apps 4,000+ apps infected

Uses multiple, advanced techniques to avoid Google Play malware detection and to maintain persistency on target devices. Establishes a rootkit on the device, allowing it to download and execute any code a cybercriminal would want to run at will. Leverages an anti-uninstall watchdog that uses two system applications to monitor the removal of one of the components and reinstall the component.

Infects via SMS phishing, interesting due to advanced obfuscation seen on mobiles for the first time.e.g. Tor based C&C server comms Roots device, send SMS messages to premium-rate numbers. Read SMS messages, defeating authentication codes sent as part of two-factor authentication mechanisms (frequently used by online banking apps and e- commerce websites).

©2015 Check Point Software Technologies Ltd. 11 Malware Industry

©2015 Check Point Software Technologies Ltd. 12 HAVE OUR PERSONAL & BUSINESS DATA BROADLY UNDEFENDED BECOME THE BACKDOOR TO YOUR NETWORK Mobile Devices Are Becoming Key In Cyber Attacks

MOBILE SECURITY BUILDING BLOCKS Mobile Device Management Policy Enforcement Secure Containers Data Leakage Prevention Anti-Virus, App Reputation Known Threats Mobile Threat Prevention Unknown Threats and Zero Day

MOBILE THREAT PREVENTION Advanced Threat Detection and Mitigation Full Visibility Simple Deployment

FULL VISIBILITY

THANK YOU