SlideShare a Scribd company logo
1 of 17
Securing hand-held computing devices :
The cyber-security challenge of the decade

                 Jagadeesan R,
               Senior Consultant
The hand-helds have arrived
   The growth rate for the hand-held market (including
    smartphones and tablets) is leapfrogging the
    desktop/laptop market growth rate by some length
    It is estimated that around 73.5 million iPhone OS
    devices( iPhones and iPod touches) had been sold
    globally till Jan 2010
    Global iPad sales are projected by Piper Jaffray to reach
    23.3 million units in 2011 - up from an estimated 13
    million in 2010
   A large number of consumer and business
    applications are being made available for hand-
    helds
The hand-helds have arrived
•    Deutsche Bank, Bank of America, Citi, JPMC,
     Standard Chartered and UBS are all running pilots with
     BlackBerry alternatives – iPhones/ Android phones
•    Starbucks already has a mobile payment app for
     the iPhone
•    Union Bank of India to introduce mobile payments
     network including person-to-person payments
•    ICICI bank-Vodafone, SBI-Airtel, Yes Bank – Nokia
     have launched mobile payments initiatives
•    Barclaycard, Orange and T-mobile are set to launch
     the UK's first commercial contactless mobile phone
     payments system this year
But hand-held security hasn’t!
   With the exception of the tightly controlled
    Blackberry platform, Powerful handhelds are a
    recent entrant into Corporate IT
   The handheld market resembles the PC market of
    the mid 1980’s to the early 90’s
          Poor awareness of most security threats
          Dynamic market with keen competition
           between several players and platforms
          Very rapid growth – “Get it out to the retailer”
           mind-set
          Highly driven by retail consumer adoption
Typical vulnerabilities seen so
              far
•   Malware
     –   Zeus mobile trojan intercepts One-time banking
         passwords sent by certain banks by SMS; affects
         Symbian and Blackberry devices
     –   Geinimi trojan for Android can allow infected phones
         to be controlled by a remote server, tracks geo-
         location and unique device ID's
•   Backdoors
     –   Android vulnerability allows malicious website to read
         files from SD card
Typical vulnerabilities
             encountered
•   User information trails in phone memory from poor
    design
     –    Mobile financial applications(Android, iPhone) from
          USAA , Wells Fargo were found to insecurely store
          account numbers and balances in phone memory
          (subsequently fixed)
•   Cross-site scripting
     –    A cross-site scripting bug in the Android market
          allowed anyone to silently install a malicious app on
          the user's Android phone (when the user clicks on a
          link while browsing the Market on a desktop)(later
          patched)
Typical vulnerabilities
             encountered
•   Signal interception
     –    Bluetooth hacks can help make calls on
          hacked phone, read/send SMS, access contact lists,
          tap phones, divert incoming calls, surf web
     –    Rogue base stations can be used to tap phones
•   Poor privacy controls
     –    There is a suit filed in court alleging that Apple and
          other app creators have been passing along user's
          personal information by tracking Unique device
          ID's/geo location without getting prior consent
Mobile device platforms - How
     do they compare?
•   For BlackBerry, Apple and Windows Phone platforms,
    apps have to pass review before being made available
    for download; This blunts some of the attack points
•   Android allows apps to be distributed through websites
    directly on the Market; This opens up more attack
    points for malware bundled into apps - to exploit
    vulnerabilities
     –   Google recently applied a master kill-switch( for the
         first time) to clean up more than 50 virus-infected
         apps from individual Android phones
Mobile device platforms - How
     do they compare?
• Google is taking the tack that more open-ness will lead to
  a more dynamic and secure Android platform in the long
  run
• However currently, there are broken links in the software
  update chain(unlike the desktop market)
• Here, there is a dependency on telecom carriers which
  typically do not push OS patches fast enough on to
  smartphones
  -   There will be a significant amount of pain in stabilizing
      Android as a secure platform
Prominent mobile security-
related products in the market
Authentication
•   RSA Secure ID 2.2 for Symbian OS and UIQ
Encryption and authentication
•   Checkpoint's Pointsec
Comprehensive cloud-scanned web-security
•   Zscaler mobile
Data-loss Prevention
•   WebSense Mobile DLP
Prominent mobile security-
related products in the market
Anti-virus
•   NetQin Mobile Anti-virus
•   CA's eTrust anti-virus software for Palm, Windows
    Mobile
Anti-virus and Anti-theft
•   McAfee WaveSecure + VirusScan
        remote lock
        GPS tracking
        remote wipe
        malware scanning
Prominent mobile security-
related products in the market
Anti-virus and Anti-theft
• Kaspersky Mobile Security 9
   –   Mobile filtering
   –   Anti-theft features(use of Phone's GPS to track
       location, Remote data-wipe/block/lock, SIM Watch) ;
       SMS find shows missing device's location on
       GoogleMaps using GPS data
   –   Encryption, Parental controls
   –   Anti-virus, Firewall Privacy protection
   –   Supports Symbian OX 9.1 and higher, Windows
       Mobile 5.0 to 6.5, BlackBerry 4.5 to 6.0 and Android
       1.6 to 2.2
In summary….
• Blackberry continues to be the most secure platform for
  Corporate IT, followed by the iPhone/iPad
• Android is likely to catch-up in the long term with it’s open
  philosophy; not at the top for security in the short term
  though - Timely pushing of patches to devices is a major
  concern.
• Windows Phone is a clear laggard even with an early
  start and a recent deal with Nokia
• Very sophisticated security applications are becoming
  available in the marketplace
• An extraordinary range of powerful functionality is
  available on these handhelds -> More power for mischief
  in the age of “Information anywhere”
Citations
•   http://gigaom.com/apple/ipod-touch-now-outselling-
    iphone/
•   http://www.mobile-tech-
    today.com/story.xhtml?story_title=Apple_May_Boost_i
    Pad_Production_To_6M_Per_Month&story_id=10100
    CJ4GFWG
•   http://www.finextra.com/News/fullstory.aspx?newsitemi
    d=22199
•   http://www.finextra.com/community/fullblog.aspx?ID=4
    933
•   http://www.finextra.com/News/Fullstory.aspx?newsitem
    id=22207
Citations
•   http://www.finextra.com/News/fullstory.aspx?newsitemi
    d=21982
•   http://spotlight.getnetwise.org/wireless/wirelessguide.p
    df
•   http://www.ameinfo.com/56628.html


•   http://www.eweek.com/c/a/Security/From-Android-to-
    the-iPhone-Security-Vendors-Target-Mobile-Devices-
    198446/
•   http://www.eweek.com/c/a/Security/Kaspersky-Adds-
    Android-BlackBerry-OS-Support-to-Mobile-Security-
    Suite-200955/
Citations
•   http://www.eweek.com/c/a/Security/Zeus-Trojan-
    Mobile-Variant-Intercepts-SMS-Passcodes-from-Bank-
    Sites-480154/
•   http://thomascannon.net/blog/2010/11/android-data-
    stealing-vulnerability/
•   http://www.netqin.com/en/security/newsinfo_3897_2.ht
    ml
•   http://www.gizmag.com/researcher-demonstrates-
    vulnerabilities-of-mobile-phones/17366/
•   http://www.veracode.com/images/pdf/the-challenges-
    of-developing-secure-mobile-applications1.pdf
Citations
•   http://viaforensics.com/appwatchdog/viaforensics-
    uncovers-vulnerabilities-smart-phone-financial-
    applications.html
•   http://jon.oberheide.org/blog/2011/03/07/how-i-
    almost-won-pwn2own-via-xss/

More Related Content

What's hot

Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 
Handheld operting system
Handheld operting systemHandheld operting system
Handheld operting systemAj Maurya
 
Specification and complexity - algorithm
Specification and complexity - algorithmSpecification and complexity - algorithm
Specification and complexity - algorithmBipul Roy Bpl
 
Introduction to loaders
Introduction to loadersIntroduction to loaders
Introduction to loadersTech_MX
 
Parsing in Compiler Design
Parsing in Compiler DesignParsing in Compiler Design
Parsing in Compiler DesignAkhil Kaushik
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)Hinal Lunagariya
 
Principle source of optimazation
Principle source of optimazationPrinciple source of optimazation
Principle source of optimazationSiva Sathya
 
Fundamentals of Language Processing
Fundamentals of Language ProcessingFundamentals of Language Processing
Fundamentals of Language ProcessingHemant Sharma
 
Building blocks of android
Building blocks of androidBuilding blocks of android
Building blocks of androidSiddhesh Palkar
 

What's hot (20)

Type Checking(Compiler Design) #ShareThisIfYouLike
Type Checking(Compiler Design) #ShareThisIfYouLikeType Checking(Compiler Design) #ShareThisIfYouLike
Type Checking(Compiler Design) #ShareThisIfYouLike
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Handheld operting system
Handheld operting systemHandheld operting system
Handheld operting system
 
Specification and complexity - algorithm
Specification and complexity - algorithmSpecification and complexity - algorithm
Specification and complexity - algorithm
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
 
Google App Engine
Google App EngineGoogle App Engine
Google App Engine
 
Introduction to loaders
Introduction to loadersIntroduction to loaders
Introduction to loaders
 
System program
System programSystem program
System program
 
Delay , Loss & Throughput
Delay , Loss & ThroughputDelay , Loss & Throughput
Delay , Loss & Throughput
 
Parsing in Compiler Design
Parsing in Compiler DesignParsing in Compiler Design
Parsing in Compiler Design
 
Assembler
AssemblerAssembler
Assembler
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
 
Principle source of optimazation
Principle source of optimazationPrinciple source of optimazation
Principle source of optimazation
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Fundamentals of Language Processing
Fundamentals of Language ProcessingFundamentals of Language Processing
Fundamentals of Language Processing
 
Building blocks of android
Building blocks of androidBuilding blocks of android
Building blocks of android
 
Ch 4 linker loader
Ch 4 linker loaderCh 4 linker loader
Ch 4 linker loader
 
Transport layer
Transport layer Transport layer
Transport layer
 

Similar to Securing hand held computing devices

ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
Securing 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingSecuring 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingJay McLaughlin
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksMichael Davis
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Andris Soroka
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveIcomm Technologies
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesTyler Shields
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectivePragati Rai
 
551_MH_overview_handout.ppt
551_MH_overview_handout.ppt551_MH_overview_handout.ppt
551_MH_overview_handout.pptNiloyMondal10
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2Santosh Satam
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
CNIT 128 Ch 1: The mobile risk ecosystem
CNIT 128 Ch 1: The mobile risk ecosystemCNIT 128 Ch 1: The mobile risk ecosystem
CNIT 128 Ch 1: The mobile risk ecosystemSam Bowne
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats ReportJuniper Networks
 
Cybercrime Mobile and Wireless Devices.pptx
Cybercrime Mobile and  Wireless Devices.pptxCybercrime Mobile and  Wireless Devices.pptx
Cybercrime Mobile and Wireless Devices.pptxVivekanandaGN1
 

Similar to Securing hand held computing devices (20)

ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 
Securing 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingSecuring 3-Mode Mobile Banking
Securing 3-Mode Mobile Banking
 
SMART PHONE
SMART PHONE SMART PHONE
SMART PHONE
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to Solve
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the Berries
 
ANDROID SECURITY
ANDROID SECURITYANDROID SECURITY
ANDROID SECURITY
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
551_MH_overview_handout.ppt
551_MH_overview_handout.ppt551_MH_overview_handout.ppt
551_MH_overview_handout.ppt
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
CNIT 128 Ch 1: The mobile risk ecosystem
CNIT 128 Ch 1: The mobile risk ecosystemCNIT 128 Ch 1: The mobile risk ecosystem
CNIT 128 Ch 1: The mobile risk ecosystem
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
 
Cybercrime Mobile and Wireless Devices.pptx
Cybercrime Mobile and  Wireless Devices.pptxCybercrime Mobile and  Wireless Devices.pptx
Cybercrime Mobile and Wireless Devices.pptx
 

Recently uploaded

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Recently uploaded (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Securing hand held computing devices

  • 1. Securing hand-held computing devices : The cyber-security challenge of the decade Jagadeesan R, Senior Consultant
  • 2. The hand-helds have arrived  The growth rate for the hand-held market (including smartphones and tablets) is leapfrogging the desktop/laptop market growth rate by some length It is estimated that around 73.5 million iPhone OS devices( iPhones and iPod touches) had been sold globally till Jan 2010 Global iPad sales are projected by Piper Jaffray to reach 23.3 million units in 2011 - up from an estimated 13 million in 2010  A large number of consumer and business applications are being made available for hand- helds
  • 3. The hand-helds have arrived • Deutsche Bank, Bank of America, Citi, JPMC, Standard Chartered and UBS are all running pilots with BlackBerry alternatives – iPhones/ Android phones • Starbucks already has a mobile payment app for the iPhone • Union Bank of India to introduce mobile payments network including person-to-person payments • ICICI bank-Vodafone, SBI-Airtel, Yes Bank – Nokia have launched mobile payments initiatives • Barclaycard, Orange and T-mobile are set to launch the UK's first commercial contactless mobile phone payments system this year
  • 4. But hand-held security hasn’t!  With the exception of the tightly controlled Blackberry platform, Powerful handhelds are a recent entrant into Corporate IT  The handheld market resembles the PC market of the mid 1980’s to the early 90’s  Poor awareness of most security threats  Dynamic market with keen competition between several players and platforms  Very rapid growth – “Get it out to the retailer” mind-set  Highly driven by retail consumer adoption
  • 5. Typical vulnerabilities seen so far • Malware – Zeus mobile trojan intercepts One-time banking passwords sent by certain banks by SMS; affects Symbian and Blackberry devices – Geinimi trojan for Android can allow infected phones to be controlled by a remote server, tracks geo- location and unique device ID's • Backdoors – Android vulnerability allows malicious website to read files from SD card
  • 6. Typical vulnerabilities encountered • User information trails in phone memory from poor design – Mobile financial applications(Android, iPhone) from USAA , Wells Fargo were found to insecurely store account numbers and balances in phone memory (subsequently fixed) • Cross-site scripting – A cross-site scripting bug in the Android market allowed anyone to silently install a malicious app on the user's Android phone (when the user clicks on a link while browsing the Market on a desktop)(later patched)
  • 7. Typical vulnerabilities encountered • Signal interception – Bluetooth hacks can help make calls on hacked phone, read/send SMS, access contact lists, tap phones, divert incoming calls, surf web – Rogue base stations can be used to tap phones • Poor privacy controls – There is a suit filed in court alleging that Apple and other app creators have been passing along user's personal information by tracking Unique device ID's/geo location without getting prior consent
  • 8. Mobile device platforms - How do they compare? • For BlackBerry, Apple and Windows Phone platforms, apps have to pass review before being made available for download; This blunts some of the attack points • Android allows apps to be distributed through websites directly on the Market; This opens up more attack points for malware bundled into apps - to exploit vulnerabilities – Google recently applied a master kill-switch( for the first time) to clean up more than 50 virus-infected apps from individual Android phones
  • 9. Mobile device platforms - How do they compare? • Google is taking the tack that more open-ness will lead to a more dynamic and secure Android platform in the long run • However currently, there are broken links in the software update chain(unlike the desktop market) • Here, there is a dependency on telecom carriers which typically do not push OS patches fast enough on to smartphones - There will be a significant amount of pain in stabilizing Android as a secure platform
  • 10. Prominent mobile security- related products in the market Authentication • RSA Secure ID 2.2 for Symbian OS and UIQ Encryption and authentication • Checkpoint's Pointsec Comprehensive cloud-scanned web-security • Zscaler mobile Data-loss Prevention • WebSense Mobile DLP
  • 11. Prominent mobile security- related products in the market Anti-virus • NetQin Mobile Anti-virus • CA's eTrust anti-virus software for Palm, Windows Mobile Anti-virus and Anti-theft • McAfee WaveSecure + VirusScan remote lock GPS tracking remote wipe malware scanning
  • 12. Prominent mobile security- related products in the market Anti-virus and Anti-theft • Kaspersky Mobile Security 9 – Mobile filtering – Anti-theft features(use of Phone's GPS to track location, Remote data-wipe/block/lock, SIM Watch) ; SMS find shows missing device's location on GoogleMaps using GPS data – Encryption, Parental controls – Anti-virus, Firewall Privacy protection – Supports Symbian OX 9.1 and higher, Windows Mobile 5.0 to 6.5, BlackBerry 4.5 to 6.0 and Android 1.6 to 2.2
  • 13. In summary…. • Blackberry continues to be the most secure platform for Corporate IT, followed by the iPhone/iPad • Android is likely to catch-up in the long term with it’s open philosophy; not at the top for security in the short term though - Timely pushing of patches to devices is a major concern. • Windows Phone is a clear laggard even with an early start and a recent deal with Nokia • Very sophisticated security applications are becoming available in the marketplace • An extraordinary range of powerful functionality is available on these handhelds -> More power for mischief in the age of “Information anywhere”
  • 14. Citations • http://gigaom.com/apple/ipod-touch-now-outselling- iphone/ • http://www.mobile-tech- today.com/story.xhtml?story_title=Apple_May_Boost_i Pad_Production_To_6M_Per_Month&story_id=10100 CJ4GFWG • http://www.finextra.com/News/fullstory.aspx?newsitemi d=22199 • http://www.finextra.com/community/fullblog.aspx?ID=4 933 • http://www.finextra.com/News/Fullstory.aspx?newsitem id=22207
  • 15. Citations • http://www.finextra.com/News/fullstory.aspx?newsitemi d=21982 • http://spotlight.getnetwise.org/wireless/wirelessguide.p df • http://www.ameinfo.com/56628.html • http://www.eweek.com/c/a/Security/From-Android-to- the-iPhone-Security-Vendors-Target-Mobile-Devices- 198446/ • http://www.eweek.com/c/a/Security/Kaspersky-Adds- Android-BlackBerry-OS-Support-to-Mobile-Security- Suite-200955/
  • 16. Citations • http://www.eweek.com/c/a/Security/Zeus-Trojan- Mobile-Variant-Intercepts-SMS-Passcodes-from-Bank- Sites-480154/ • http://thomascannon.net/blog/2010/11/android-data- stealing-vulnerability/ • http://www.netqin.com/en/security/newsinfo_3897_2.ht ml • http://www.gizmag.com/researcher-demonstrates- vulnerabilities-of-mobile-phones/17366/ • http://www.veracode.com/images/pdf/the-challenges- of-developing-secure-mobile-applications1.pdf
  • 17. Citations • http://viaforensics.com/appwatchdog/viaforensics- uncovers-vulnerabilities-smart-phone-financial- applications.html • http://jon.oberheide.org/blog/2011/03/07/how-i- almost-won-pwn2own-via-xss/