The iScan Online mobile security analysis provides visualization of the vulnerability landscape pertaining to Android and Apple iOS smartphones and tablets. This report is intended to provide meaningful metrics to organizations who need to assess mobile vulnerabilities and protect confidential PII data.
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Infographic - 2013 Mobile Security Analysis
1. 2013 MOBILE SECURITY ANALYSIS
The iScan Online mobile security analysis provides visualization of the security landscape for Android and Apple iOS
smartphones and tablets. This report is intended to provide meaningful metrics about vulnerabilities and threat vectors
to organizations who allow BYOD and mobile workers.
OPERATING
SYSTEM
25%
25%
Master Key, Kernel
Driver, Cryptography
Architecture
CONFIGS
25%
Passwords, Bluetooth,
Encryption,
Jailbroken/Root, 3rd
Party App Stores
25%
APPLICATIONS
Browsers, Gaming,
Productivity, Social,
Banking, Payment
Processing
CONFIDENTIAL
DATA ‘PII’
Credit Cards, Social
Security and Drivers
License numbers
ISCAN ONLINE MOBILE THREAT QUADRANT
53% of Android & Apple iOS devices
scanned, could have been updated to
prevent unauthorized access to data and
applications.
423
Mobile vulnerabilities are on the rise. 365% increase in
mobile vulnerabilities discovered since 2010.
155
268
Operating Systems
91
MOBILE VULNERABILITIES
Applications
98%
2010 2011 2012 2013
98% of the devices scanned were running
vulnerable web browsers and apps.
Adobe, Trip Advisor, Firefox & Wordpress
were the most common vulnerable apps.
Credit Card Data
Mobile Devices
On average, 1 out of 11
smartphones store unprotected
credit card data facilitated via
cloud syncing.
5% of smartphones were
lost or stolen in 2013.
Configurations
94% of devices failed 3 or more security
settings. 47% had no onscreen password
with 96% of encryption disabled
53%
94%
10%
Confidential Data
Unprotected credit card data was
detected on 10% of devices scanned.
Commonly found in SMS Messages,
Contacts & documents on SD Cards
ISCAN PREDICTS
The mobile threat quadrant in conjunction with the
adoption of mobility and cloud syncing
technologies will cause Mobile Data Breaches to
become a top headline in 2014
70%
50
MOBILE SECURITY SCANNING
Today there are a wide array of smartphones, tablets and laptops connecting
to your network. IT Departments are quickly prioritizing mobile vulnerability
scanning and remediation efforts to identify the mobile threat quadrant listed
above.
Scan Anyone, Anytime, Anywhere
www.iscanonline.com