Presentation is loading. Please wait.

Presentation is loading. Please wait.

Vulnerabilities in Mobile Applications and Input Systems

Similar presentations


Presentation on theme: "Vulnerabilities in Mobile Applications and Input Systems"— Presentation transcript:

1 Vulnerabilities in Mobile Applications and Input Systems
Natalia Tituana

2 Introduction Mobile applications and Input systems have their vulnerabilities in the way they are controlled. This can range from how they are created as well as how easy it is to access them without user authorization. I’ll explore the many ways in which vulnerabilities can hinder these systems ability to operate effectively and safely.

3 What are mobile applications and input systems?
Mobile applications are web based softwares that can be downloaded on a mobile phone. They range from , video, social media and even banking purposes. Input systems are devices that can be paired with a computer or gaming console.

4 Vulnerabilities in Mobile Applications
What kind of vulnerabilities can affect mobile applications? Mobile apps can be affected by many inconveniences, such as crashes and errors. Therefore software maintenance is important. But when it comes to a weakness, developers may not realize that their apps have a bug and therefore causes the app to perform irregularly.

5 Apple’s FaceTime App Bug
In recent weeks, giant tech company Apple, was faced with a bug that affected their video chatting application FaceTime. The bug allowed users to make a call but also see and hear the call recipients conversations without them having answered the call. This vulnerability is critical to a users privacy and in having it can lead to potential hackers stealing information and as well as revealing it to other cyber criminals. Apple’s FaceTime App Bug

6 Applications As Spyware?
Another vulnerability with using mobile applications is that they can be utilized as a form of spyware. For example, app developers can create their application to record the users key logs and screen activity. This is called “session replay”, wherein developers are able to view any information typed on the screen. This includes any personal information such as credit card info, addresses, etc. Applications As Spyware?

7 Applications As Spyware? (continued)
In recent weeks, giant tech company Apple warned app developers to cease their use of “session replay” or their app would banned from the App Store. This is a way for the company to comply with their privacy regulations. This vulnerability in apps is another manner in which users must be careful. If app developers are recording user activity, it poses a greater risk for that information to fall into the wrong hands. It can be argued that this is a form of spyware because users are being watched through their usage activity without their consent. Applications As Spyware? (continued)

8 Resolution A resolution to these issues are to closely examine any possible cracks that may need patching up. Although patching may not be the only solution, since it maybe be prone to opening up a new set of bugs. Another solution is to do vigorous testing and app maintenance. In the case of applications tracking user activity, the best solution has already been provided by the application store. But another solution can be to not download the application altogether.

9 Vulnerabilities In Input Systems
Input systems range from microphones, keyboards, controllers, and webcams. In recent years there has been an increase in hackers illegally gaining access into the webcams and microphones of many personal PCs. Many have thought of this as another sense of paranoia, therefore it is nothing to be worried about. But, we’ve even seen individuals such as billionaire Mark Zuckerberg covering the webcam on his PC. Vulnerabilities In Input Systems

10 Vulnerabilities In Input Systems (continued)
Although many may believe that covering webcams with tape is a measure of paranoia, there is one case that stands out in this form of privacy invasion. That being the brazen invasion of privacy suffered by Miss Teen USA in 2013.

11 Vulnerabilities In Input Systems (continued)
This is a great example because it proves that not only do these cyber crimes really happen, but also that no one is exempt from it happening to them. These types of crimes often lead to lives being ruined, wherein the person being blackmailed takes their own life. It can happen to almost anyone without them knowing, which is what happened in this example. In these types of crimes the criminals often seek money.

12 Resolution One may say that a resolution to prevent webcam/microphone hacking is to disconnect and or tape up webcams. But other solutions involve changing and creating stronger passwords for our devices. Another solution can also be to use a secured network, therefore potential cyber criminals are out of luck when trying to gain unauthorized access. Another resolution is to utilize a VPN or virtual private network for an extra added layer of security, specifically for IP addresses.

13 Conclusion To conclude, when we introduce ourselves to different forms of technology we must look at its weaknesses and strengths. Although technology is becoming smarter, we have to take the next step in outsmarting it. We must continue to teach ourselves and others to be safe with technology and not only rely on it to think for us. We must also be informed on new changes and what potential security risks it poses for us as well as what security measures we can take to prevent it.


Download ppt "Vulnerabilities in Mobile Applications and Input Systems"

Similar presentations


Ads by Google