SlideShare a Scribd company logo
Mobile Computing Threats

  Exposure, Exploit and Opportunity = Attack
             David Michael Perry
Global Director of Education – Trend Micro, Inc.
EVERY YEAR
•   Systems are more powerful
•   Systems are faster
•   Systems are smaller
•   Systems are more connected
•   Systems are more mobile
•   Systems are victims
This is NOT the problem
                                                                                                                   = Symbian OS (Nokia, etc)
                                                                                                                   = Windows Mobile (HP iPAQ, etc)

20June0        21Nov04             8Mar05                                                                          = Java (J2ME)
                                                    15Apr05
   4
 Cabir          Skulls             Dampig           Hobbes                                                                                  11Jul07     28Feb08
                                            4Apr05                      19Jul05                                                             Flexspy      Hathat
                         1Feb05                                                       23Nov05                      4Sep06       10Mar0
                                            Mabir                                                     30Mar06                                                  5Mar08
                                                                     Cadmesk                                                      7                 4Feb08
     5Aug04                                                                           PBSteal                       Acallno     Feakks
                         Locknut                                                                      Flexspy                                                   Dropper
                                                              8Jul05                                                                                Smsany
    Win CE               (Gavno)                                              21Sep05       28Feb06
    BRADO                                                                                                   18Jun0       14Nov06       21May0
                                                              Boottoo         Cardtrp       RedBrow
      R                                                                                                        6
                                                                                                            Romride      Comdrop          7
                                                                                                                                        Viver
                                                                n




                                                         Doomed                                                                                        Fonzi       Kiazha
                                                                                                        OneJump       Wesber       Feaks
            Qdial             Comwar                     4Jul05                          Sndtool                                                      28Feb08
                                             Fontal                                                                               10Mar07                          5Mar08
                              7Mar05                                        Blanfon                       3Apr06      7Sep06
                                                                                          23Jan06
          12Aug04                               6Apr05                                                                                    Mpofeli
                                                                            10Aug05                                                                     Infojack
                    Vlasco             Drever                  Skudoo                                                                    12Jun07
                                                                                                 Cxover                       Mrex                      29Feb08
   Win CE                                                         19Jul05
                    29Dec04            18Mar05                                                                                1Dec06               Beselo
   DUTS                                                                           Cardblk        15Mar06
                                                                                                                Mobler
  17Jul04                                                                         2Oct05                        31Aug06                          23Jan08



      2004                                          2005                                        2006                             2007                       2008
   Note: Chart includes new malware strains, does not include variants
This is part of the problem
This is a BIGGER PART of the problem




Source: Argonne National Laboratory, Nuclear Engineering Division,
Vulnerability Assessment Team (VAT)
http://www.ne.anl.gov/capabilities/vat/seals/maxims.html
The data is moving into mobile, as is 
                    the connectivity
The main advantage in mobile
Threats To Enterprise Devices
Compromised data at rest
 Compromised Data
      Countermeasures
        –Encryption
       –Authentication
          –Firewall
     Compromised data
        in motion          Impaired Productivity
                              Block hacking, intrusions,
                                 Countermeasures
     Countermeasures
                                       malware
                                   –Firewall/IDS
        –SSL/VPN
                              –Antivirus/anti-spyware
The Problem
• Information (DATA)  is property
• YOUR DATA is out in the world, in mobile 
  devices, out of your protection and control
• New threats always arise suiting the newest 
  medium of information exchange.
• Social Networks
• There are bad guys out there.
And yet, the process accelerates
There is a light at the end of the 
              tunnel
Think mobile devices are safe?
              Think again!




To find out more about protecting mobile devices go to www.trendmicro.com

More Related Content

PDF
2011 option expirations
PDF
Duratex - 2005 Results
PDF
PDF
2010 CRC Showcase Urban Rail - Urban Rail Demand Management R1.107
PDF
4 Proftiable Growth, Service Enabled Cust Exp
PPTX
Business Network Overview of Taiwan Professional Group
PPT
Social Media Overview
PPT
TMK.edu Traditional Media Buying Presentation: August 2015
2011 option expirations
Duratex - 2005 Results
2010 CRC Showcase Urban Rail - Urban Rail Demand Management R1.107
4 Proftiable Growth, Service Enabled Cust Exp
Business Network Overview of Taiwan Professional Group
Social Media Overview
TMK.edu Traditional Media Buying Presentation: August 2015

More from Interop (20)

PDF
Preparing for the cloud
PDF
Portable clouds navigating cloud standards
PDF
Planning for (and deploying!) 4 g wireless
PDF
Planning and implementing windows 7
PDF
Overview and current topics in solid state storage
PDF
Outsourcing it security yes, it’s still your problem
PDF
Next gen lan infrastructure
PDF
New approaches to vulnerability management
PDF
Mst cloud interoperability process
PDF
Mobile security new challenges practical solutions
PDF
Mobile application development strategies
PDF
Managing your virtual environment
PDF
Managing change in the data center network
PDF
Managing a public cloud
PDF
Malice through the looking glass
PDF
Extending the lifecycle of your storage area network
PDF
Desktop virtualization primer one size does not fit all
PDF
Desktop virtualization best practices
PDF
Deep dive why networking must fundamentally change
PDF
Deep dive storage networking the path to performance
Preparing for the cloud
Portable clouds navigating cloud standards
Planning for (and deploying!) 4 g wireless
Planning and implementing windows 7
Overview and current topics in solid state storage
Outsourcing it security yes, it’s still your problem
Next gen lan infrastructure
New approaches to vulnerability management
Mst cloud interoperability process
Mobile security new challenges practical solutions
Mobile application development strategies
Managing your virtual environment
Managing change in the data center network
Managing a public cloud
Malice through the looking glass
Extending the lifecycle of your storage area network
Desktop virtualization primer one size does not fit all
Desktop virtualization best practices
Deep dive why networking must fundamentally change
Deep dive storage networking the path to performance
Ad

Recently uploaded (20)

PPTX
Cardiovascular Pharmacology for pharmacy students.pptx
PDF
Business Ethics Teaching Materials for college
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
01-Introduction-to-Information-Management.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Open Quiz Monsoon Mind Game Final Set.pptx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Basic Mud Logging Guide for educational purpose
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Open folder Downloads.pdf yes yes ges yes
Cardiovascular Pharmacology for pharmacy students.pptx
Business Ethics Teaching Materials for college
Anesthesia in Laparoscopic Surgery in India
O7-L3 Supply Chain Operations - ICLT Program
2.FourierTransform-ShortQuestionswithAnswers.pdf
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
01-Introduction-to-Information-Management.pdf
PPH.pptx obstetrics and gynecology in nursing
Open Quiz Monsoon Mind Game Final Set.pptx
STATICS OF THE RIGID BODIES Hibbelers.pdf
Insiders guide to clinical Medicine.pdf
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Basic Mud Logging Guide for educational purpose
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
102 student loan defaulters named and shamed – Is someone you know on the list?
Abdominal Access Techniques with Prof. Dr. R K Mishra
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Open folder Downloads.pdf yes yes ges yes
Ad

Mobile computing threats