SlideShare a Scribd company logo
Mobile Working With Z-Push & BES  – What About Risks? Jens Fell
Statement  No.  1  Smartphone OS are the unknown OS in business! Apple iOS
bada, by Samsung (a version with Linux-Kernel)
BlackBerry, by RIM: proprietary system with push technology
Brew, by Qualcomm
Linux in various forms: Android, by Open Handset Alliance (leadership by Google)
MeeGo, initiative by Nokia and Intel
Mobilinux, by MontaVista
Openmoko
webOS, by Palm Symbian, administrated by Symbian Foundation
Windows Phone and Windows Mobile by Microsoft
Statement  No.  2  Everything, that happens to a laptop, can happen to a smartphone, too!
Sources of Risk Bluetooth
WiFi (W-LAN)
Camera
GPS
SMS/MMS
Email
Apps
Browser
Level of Risk Abuse of corporate and private data by unauthorized access via device e. g. access to social media identities, remote login, credit cards, ..... Loss of sensitive information e. g.  notes ,  pictures ,  scanned   business   cards Attacks by mobile malware  e. g. data theft, extortion  Output of confidential data if the device is stolen, lost or spied e. g. theft of intellectual property
Mobile Malware Risk  for mobile  devices   is   rising Number of signatures for mobile devices on 11 January 2011 -> 1834

More Related Content

PDF
Mobile Security
PDF
Mobile phone security
PPT
Smart phone and mobile device security
 
PPTX
Mobile security
PDF
Mobile Security 101
PPTX
Cp3201 mobile security final
PPTX
Mobile security by Tajwar khan
Mobile Security
Mobile phone security
Smart phone and mobile device security
 
Mobile security
Mobile Security 101
Cp3201 mobile security final
Mobile security by Tajwar khan

What's hot (20)

PDF
Smartphone Ownage: The state of mobile botnets and rootkits
PPTX
Mobile virus & worms
PDF
Can You Steal From Me Now? Mobile and BYOD Security Risks
PPT
Security threats facing SA businessess
PDF
CTO Cybersecurity Forum 2013 David Turahi
PDF
News Bytes - December 2012
PPTX
Mobile device security
PDF
Spy android malware - eScan
PDF
Raimund genes from traditional malware to targeted attacks
PDF
Piracy and Types
PDF
Malicious malware breaches - eScan
PPT
Virus09
PPT
Port security
PPTX
Smartphone security
PDF
Evolutionand impactofhiddenmobilethreats wandera
PDF
Data Mining For Intrusion Detection in Mobile Systems
DOCX
5 spy software
PDF
Report on Mobile security
Smartphone Ownage: The state of mobile botnets and rootkits
Mobile virus & worms
Can You Steal From Me Now? Mobile and BYOD Security Risks
Security threats facing SA businessess
CTO Cybersecurity Forum 2013 David Turahi
News Bytes - December 2012
Mobile device security
Spy android malware - eScan
Raimund genes from traditional malware to targeted attacks
Piracy and Types
Malicious malware breaches - eScan
Virus09
Port security
Smartphone security
Evolutionand impactofhiddenmobilethreats wandera
Data Mining For Intrusion Detection in Mobile Systems
5 spy software
Report on Mobile security
Ad

Viewers also liked (7)

PPTX
How SMEM Evolved
PDF
Madininair
PDF
Spectrum Gaming Group, Independent Research and Professional Services
PDF
Pricelist premium italian qts range
PDF
Medical devices from patients' perspectives
DOCX
Usaha
ODP
Enterprise Atom/RSS Information distribution with IBM Lotus Notes/Domino
How SMEM Evolved
Madininair
Spectrum Gaming Group, Independent Research and Professional Services
Pricelist premium italian qts range
Medical devices from patients' perspectives
Usaha
Enterprise Atom/RSS Information distribution with IBM Lotus Notes/Domino
Ad

Similar to Mobile security 8soft_final_summercamp2011 (20)

PPTX
Ms810 assignment viruses and malware affecting moblie devices
ODP
Confraria Security & IT - Mobile Security
PPTX
IQT 2010 - The App Does That!?
PDF
Mobile Malware
PPT
2010: Mobile Security - WHYMCA Developer Conference
PPT
cellphone virus and security
PDF
Article on Mobile Security
PDF
Mobile security article
PDF
ISACA CACS 2012 - Mobile Device Security and Privacy
PDF
WEEK5 Mobile Device Security 31032022.pdf
PDF
Mobile Security for Smartphones and Tablets
PPTX
Securing hand held computing devices
PDF
Droidcon2013 security genes_trendmicro
PPTX
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
PDF
Make Mobilization Work - Properly Implementing Mobile Security
PDF
Shmoocon 2010 - The Monkey Steals the Berries
PDF
Securing mobile devices in the business environment
PDF
Whitepaper - CISO Guide_6pp
PDF
The New Mobile Landscape - OWASP Ireland
Ms810 assignment viruses and malware affecting moblie devices
Confraria Security & IT - Mobile Security
IQT 2010 - The App Does That!?
Mobile Malware
2010: Mobile Security - WHYMCA Developer Conference
cellphone virus and security
Article on Mobile Security
Mobile security article
ISACA CACS 2012 - Mobile Device Security and Privacy
WEEK5 Mobile Device Security 31032022.pdf
Mobile Security for Smartphones and Tablets
Securing hand held computing devices
Droidcon2013 security genes_trendmicro
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
Make Mobilization Work - Properly Implementing Mobile Security
Shmoocon 2010 - The Monkey Steals the Berries
Securing mobile devices in the business environment
Whitepaper - CISO Guide_6pp
The New Mobile Landscape - OWASP Ireland

More from Zarafa (20)

ODP
Zarafa SummerCamp 2012 - Basic Introduction WebApp plugin development
PPTX
Zarafa SummerCamp 2012 - Android Workshop
PPT
Zarafa SummerCamp 2012 - Steve Hardy Friday Keynote
ODP
Zarafa SummerCamp 2012 - Project approach when migrating to Zarafa
ODP
Zarafa SummerCamp 2012 - Keynote Peter Ganten
ODP
Zarafa SummerCamp 2012 - Yubikey integration
PPT
Zarafa SummerCamp 2012 - Exchange Web Services, technical information
ODP
Zarafa SummerCamp 2012 - Tips & tricks for running Zarafa is larger scale env...
PDF
Zararfa SummerCamp 2012 - HA, multi-tenancy and SSO in Zentyal 2 and 3.pdf
PDF
Zararfa SummerCamp 2012 - Debian packaging Giraffe and D-push
PDF
Zararfa SummerCamp 2012 - Fedora update & PAM-MAPI Zarafa Ready certified com...
PDF
Zararfa SummerCamp 2012 - Community update and Zarafa Development Process
PDF
Zararfa summer camp 2012 interesting tips & tricks when migrating to zarafa
PPT
Zarafa SummerCamp 2012 - Keynote Steve Hardy - 3 Cool innovations
ODP
Zarafa SummerCamp 2012 - Deploying Zarafa Archiver
ODP
Zarafa SummerCamp 2012 - Open Generation Gap
PPT
Zarafa SummerCamp 2012 - Zarafa Cluster using a reverse proxy
PPT
Zarafa SummerCamp 2012 - Zarafa 7.1 features
PPTX
Zarafa SummerCamp 2012 - Z-push 2.0 changes for administrators
PDF
Zararfa SummerCamp 2012 - Performing fast backups in large scale environments...
Zarafa SummerCamp 2012 - Basic Introduction WebApp plugin development
Zarafa SummerCamp 2012 - Android Workshop
Zarafa SummerCamp 2012 - Steve Hardy Friday Keynote
Zarafa SummerCamp 2012 - Project approach when migrating to Zarafa
Zarafa SummerCamp 2012 - Keynote Peter Ganten
Zarafa SummerCamp 2012 - Yubikey integration
Zarafa SummerCamp 2012 - Exchange Web Services, technical information
Zarafa SummerCamp 2012 - Tips & tricks for running Zarafa is larger scale env...
Zararfa SummerCamp 2012 - HA, multi-tenancy and SSO in Zentyal 2 and 3.pdf
Zararfa SummerCamp 2012 - Debian packaging Giraffe and D-push
Zararfa SummerCamp 2012 - Fedora update & PAM-MAPI Zarafa Ready certified com...
Zararfa SummerCamp 2012 - Community update and Zarafa Development Process
Zararfa summer camp 2012 interesting tips & tricks when migrating to zarafa
Zarafa SummerCamp 2012 - Keynote Steve Hardy - 3 Cool innovations
Zarafa SummerCamp 2012 - Deploying Zarafa Archiver
Zarafa SummerCamp 2012 - Open Generation Gap
Zarafa SummerCamp 2012 - Zarafa Cluster using a reverse proxy
Zarafa SummerCamp 2012 - Zarafa 7.1 features
Zarafa SummerCamp 2012 - Z-push 2.0 changes for administrators
Zararfa SummerCamp 2012 - Performing fast backups in large scale environments...

Recently uploaded (20)

PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
Tartificialntelligence_presentation.pptx
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Hybrid model detection and classification of lung cancer
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
Modernising the Digital Integration Hub
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
NewMind AI Weekly Chronicles - August'25-Week II
Final SEM Unit 1 for mit wpu at pune .pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Tartificialntelligence_presentation.pptx
A contest of sentiment analysis: k-nearest neighbor versus neural network
cloud_computing_Infrastucture_as_cloud_p
1 - Historical Antecedents, Social Consideration.pdf
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
Chapter 5: Probability Theory and Statistics
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
TLE Review Electricity (Electricity).pptx
Hybrid model detection and classification of lung cancer
observCloud-Native Containerability and monitoring.pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
NewMind AI Weekly Chronicles – August ’25 Week III
Modernising the Digital Integration Hub

Mobile security 8soft_final_summercamp2011