Mobile Phone Security. [ Lecturers ] Jure Bogunović Marin Cokarić.

Slides:



Advertisements
Similar presentations
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Advertisements

Mobile Devices and Support Kathy Boock Diane Jachimowicz.
1 Alcatel Onetouch Antivirus. 2 Thinking about security on your smartphone Alcatel OneTouch? We have the solution. Among the applications on your smartphone,
7 Effective Habits when using the Internet Philip O’Kane 1.
Smartphone Security How safe are you?. Main Points 1. Malware/Spyware 2. Other Mischief 3. How a phone might get infected 4. Staying Safe a. Malware b.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
24/7/365 Remote Computer Support. Program Overview.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
From AV to Internetized Security Solution 马杰 Jeffrey Beijing Rising Tech. Co., Ltd. --- The Analysis Report of Malware Technology in China in 2005.
 Smartphone overview › Platform comparison  App Construction  Smartphone malware and viruses  Security threats  Keeping your Smartphone clean.
School location collector
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Sophos Mobile Security
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
Cyber Crimes.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
IT security By Tilly Gerlack.
INTEROP 2014 Mobile Issues in the Network. Mobile Issues Data loss – Hardware theft or failure – Data corruption Data theft – Hardware theft – Spyware,
Malware Adware Removal Best Free Malware Virus Protection Best Free Malware Adware Removal Service Best free Anti Spyware Removal Service Best free Trojan.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España.
1 Company Proprietary and ConfidentialThe document name can go here Android OS Security Omar Alaql July 8, 2013 Kent State University Android OS Security.
Android Mobile Security Krystal Salerno. Introductions.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.

Mobile Security iPhone and Android OS. iPhone Security Features Find my iPhone Remote wipe Automated back up at sync Auto lock / passcode lock Wipe after.
Winning with Check point
What is Spam? d min.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
The “Five W’s” of Mobile Device Malware: W ho, W hat, W hen, W here, and W hy? … and What Can be Done About It? Kevin McPeak, CISSP, ITILv3 Technical Architect,
Cyber Safety Jamie Salazar.
About Us AVG is a global security software maker protecting 98 million active users in 170 countries from the ever-growing incidence of Web threats, viruses,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
 There are many android hack tool given on the internet that promises to give you best performance. But unfortunately most of the android hack tool are.
NESSUS. Nessus Vulnerability Scanner Features: Ease of use Deep Vulnerability Analysis Discover network based and local vulnerabilities Perform configuration.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Personal Data Protection and Security Measures Kelvin Lai IT Services - Information Security Team 12 & 13 April 2016.
Staying Secure in an Insecure World NATE HOWE CHIEF INFORMATION SECURITY OFFICER Education – Partnership – Solutions.
Android and IOS Permissions Why are they here and what do they want from me?
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Ransomware BISD Technology Department. Ransomware Ransomware is a type of malicious software (malware) that infects a computer and/or mobile device and.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Security and Privacy in Social Networks
Configure Instruction
Antivirus Support Phone Number + 1-(844) One Step IT Solutions December 6, 2017
Setting Up Chatter on Mobile devices
Mobile Banking What can it do for you?.
Technical Steps to Install Norton Mobile Security on Android Phone.
McAfee Activate  McAfee offers advanced security solutions to the computer users across the globe.  It offers a wide selection of antivirus and internet.
How To Install Norton Security on Android Phone
+1(844) | Norton.com/setup | Norton Internet Security
Call AVG Antivirus Support | Fix Your PC
Malwarebytes Anti-Ransomware Startup Problems
Malwarebytes Malwarebytes Database Missing or Corrupt
Norton technical support Norton.com/Setup | Norton Setup and Install with Product Key Norton Antvirus Activation For protection against.
Android Training in Chandigarh The best Android antivirus in 2018.
Avast - Antivirus | Internet Security. Introduction Avast Antivirus is afamily of internet security application developed by Avast for windows,mac OS,
4 ways to stay safe online 1. Avoid viruses and phishing scams
Mobile Pen Testing w/ drozer
Staying safe on the internet
Presentation transcript:

Mobile Phone Security

[ Lecturers ] Jure Bogunović Marin Cokarić

[ Agenda ] App Permissions Mobile Malware Types Mr. Nice Summary Demo – Mr. Nice

[ App permissions ] Permission groups

{ Some App with 2 permissions }

[ Mobile Malware Types ] Ransomware Fake AV (Anti Virus) & Ransom AV Fake SMS Transaction/token interception Remote Administration Tool, Dendroid bot

{ Fake AV }

{ Fake AV - Ransomware}

{ Remote Administration Tools }

{ Other money making scams } Fake SMS Bank transaction/token interceptor Adware

{ SMSaj.com.hr }

[ Mr. Nice ]

{ Features } S&F all incoming/outgoing Calls/SMS S&F all Contact Phone numbers/ address S&D all running/installed Applications Remote Control Commands

[ Mr. Nice ]

{ Remote control commands }

Cya at 5th of December ;) { Demo }

[ Summary ] Avoid installing android apps from third-party websites or unreliable sources Always read the permissions of every app before installing Always protect your device with a password Never view or share personal information over a public wi-fi network Choose an antivirus app for your phone and keep it updated Use a backup or security application for the data stored in your android device

Cya at 5th of December ;) Questions ???

{ Links } Symantec - Android Police - App Permissions Xamarin -

Cya at 5th of December ;) Databases Fani Bajić