MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Thank you to IT Training at Indiana University Computer Malware.
1 Computer and Internet Security JCCAA Presentation 03/14/2009 Yu-Min (Phillip) Hsieh Sr. System Administrator Information Technology Rice University.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Quiz Review.
Viruses & Destructive Programs
Chapter Nine Maintaining a Computer Part III: Malware.
Hierarchical file system Hierarchical file system - A hierarchical file system is how drives, folders, and files are displayed on an operating system.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
1 Introduction to Security Chapter 11 Information Technology (IT) Security.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
THREATS TO MOBILE NETWORK SECURITY
Unit 2 - Hardware Computer Security.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
Essential Computer Concepts
1 Kids on the Web. Child’s play? September, 2008.
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
IT Security for Users By Matthew Moody.
1.1 System Performance Security Module 1 Version 5.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
PC Security: Antivirus Presentation done by Ming-Li Emily Chang (A2980) Raymond Chok (A2419)
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
PLUG IT IN SIX Protecting Your Information Assets.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Business Technology Applications What is Malware.
Understand Malware LESSON Security Fundamentals.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Android and IOS Permissions Why are they here and what do they want from me?
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Mobile Device Security Management Leyna Belinsky.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
IT Security  .
Network security threats
How to Get Rid of Online Threats Impacting your Computer Device?
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
HOW DO I KEEP MY COMPUTER SAFE?
How to keep the bad guys out and your data safe
Presentation transcript:

MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1

Mobile Malware 2  Malware for starters is also known as malicious software, which is software that is designed to sneak into a person’s computer and perform harm on a targeted system without the user’s knowledge of the breach of access.  The computer virus is a flattering remark of malware to identify a variety of unwelcome, intrusive, and annoying software or program code. Malware includes computer viruses, worms, Trojan horses, root-kits, spyware, and adware.  Mobile Malware Cell phones evolved into smart-phones with the capabilities to download programs from the Internet and share software. Vulnerabilities arise in mobile technology with short range Bluetooth connections, world-wide multimedia messaging service communication and memory cards.

Greatest Threats 3  Text messages  Contacts  Video  Phone transcriptions  Call history  Documentation  Buffer overflows

Text Messages 4  Phishing SMS (short message service)  A.K.A SMiShing  Malware that uses text-messaging APIs to send fake messages to people on your contact list. This is similar to spoofing.  This type of phishing has an even higher likelihood of success because of the victims’ lack of awareness.

Contacts 5  In a corporate environment, the contact list is one of the most important features of a smart phone.  Theft of corporate contact data could have dire consequences for the employee and the company.  Mobile malware can “steal” a contact list.  It can send out short messages containing malware or a link to malware.  An example, which I consider a celebrity testimonial.  Paris Hilton – Nokia Sidekick …

Video 6  Most mobile phones now have a video and a photo camera.  Mobile malware could take over the phone and use the camera to snap photos with the owners informed consent.  Difficult to get a good angle when the malware wants to use the camera.  If the attacker is skilled, he/she could automate the exploitation using the camera.  The security of the photos and video already on the device is much easier to exploit.  Malware could search for all JPG files and send those files to a malicious third-party via the wireless network

Phone Transcripts 7  Your mobile phone can to suddenly turn into a tape recorder.  Using the mobile voice-recording application, malware could indeed change a mobile into a tape recorder.  Limits… nay, nay!  Mobile phones have limited storage space, however, so malware cannot record indefinitely. But, it could send the recorded file to an attacker via Multimedia Message Service. If the attack were combined with the SMS interception technology, the malware could use SMS to activate the recording function. Enabling the mobile phone into a tape recorder that could be turned on and off remotely.

Call History 8  Call history list can be valuable, and malicious programs can read this information.  Users should pay attention to their call history.  Periodically delete unnecessary records to lessen the severity of an infection.

Documentation 9  Many mobile phone users read and store Word, Excel, or PDF files on their mobile phones.  Files with the extensions  *.doc  *.xls  *.pdf  The above extensions are likely to become popular targets for mobile malware thieves.

Buffer Overflows  Plague mobile devices.  Slows data connectivity  Causes a phone call to get dropped.  Your phone can be experiencing a buffer overflow and you’re not even aware. 10

Prevention 11  The best way to protect your mobile device is to keep malware off in the first place.  Use the same precautions for your phone as you would for your Windows laptop computer.  Use a combination of both PC-based anti-virus software and mobile anti-virus software  Mobile users should follow the same safe browsing practices they perform at their computers.  Accept only programs that bear digital signatures. EX. Programs that have passed the Mobile certificate test and are developed by legitimate commercial software vendors. After your mobile has been infected by malware, removal can be complicated!!

What we have learned… 12  Be careful with Wi-Fi and Bluetooth  Backup Frequently  Install mobile anti-virus software  Do not save business data on your mobile phone

Final thoughts… 13  It is essential to exercise extreme caution.  Why?  Your phone is your livelihood  There are mobile phones using the Windows Mobile OS.  Convenient and are growing in popularity  Use the many APIs  There is a lack of security awareness from users.  Malware writers will continue to attack with the powerful promise of financial gain.  Ex. Pop-up “Earn $5000 a week working from home!”  If we let out guard down then we will run into significant risks from Mobile Malware.