Subscribe
About
  • Home
  • /
  • Hardware
  • /
  • Mobile devices: things are getting personal, including attacks

Mobile devices: things are getting personal, including attacks

When it comes to mobile devices, things are getting more personal, including attacks. Contact lists, e-mails and text messages are just the tip of what people keep on their devices. With banking applications, location histories, social media, photographs, enterprise applications and more housed on devices, they are a convenient, one-stop location for cyber criminals to access private information.

Financial gain or to cause harm to an individual or a company are what drive attacks on mobile devices. Typically these attacks are via mobile malware which has grown exponentially in the past five years. In 2012, there were just over 214 000 new malware samples on Android devices, this figure is estimated at 3 500 000 for 2017 (https://www.gdatasoftware.com/blog/2017/04/29712-8-400-new-android-malware-samples-every-day). In 2016, Checkpoint found an Android vulnerability affecting 900 million devices which an attacker could easily using a malicious app. Such an app would require no special permissions to take advantage of these vulnerabilities, alleviating any suspicion users may have when installing. (http://blog.checkpoint.com/2016/08/07/quadrooter/)

"The reality is that we are exposed from all angles. Phishing calls, e-mails, text messages, malicious apps and even physical robbery put us and the content we keep at risk. Most of us know the potential risks and the associated dangers but few do anything really meaningful to protect themselves or their devices. For the most part it's due to naivety," says Michael Morton, a mobile security specialist at Securicom, a leading managed IT security solutions company.

He says the more personal the information is on a device, the more personal the attacks on a user can become.

"For a number of years, we have seen people becoming victims of premium SMS scams. You know, the ones where you get charged for services you didn't sign up for. If you haven't been a victim yet, probably someone you know has been and the charges can run into the thousands. But, more sinister than this is the tracking of locations and movements; spying on user and log activity and collecting data stored on devices such banking login details which allow criminals to steal money from their victims. Certain types of mobile malware can actually open back doors into a device that allow attackers to take full control of the device."

For companies, a compromised device connecting to the network or carrying sensitive business information poses an IT security risk.

"Data loss is top of the list of concerns for businesses, and with all the auditing compliances that are coming into place, mobility management, especially in bring-your-own-device environments, should be a priority.

"Companies need to have the ability to check what apps employees are using, block malicious applications, and ensure that internal and third-party apps meet their corporate security requirements. Without application control capabilities, there is no effective way for companies to manage what apps employees are using or for what.

"The mobility management solution should provide the basics like password protection; remote wipe-clean and lock functionality; device encryption; anti-malware; jailbreak detection. Over and above that, the solution should support VPN configuration and management; offer data loss prevention; access control to company networks and printers, and tools for monitoring, managing and reporting on the mobile device environment."

Share

Securicom

Securicom is a leading managed IT services vendor in Africa, with global presence. It is one of a handful of local vendors to offer an end-to-end range of fully managed IT security services for the cloud, from the cloud. Its consumption-based services are available through a select partner network in Africa.

Securicom's holistic suite of solutions provides comprehensive weaponry and proactive defence against the host of threats that afflict businesses today from endpoint protection, managed firewalls, and advanced Fortigate reporting, to WAN and LAN optimisation; e-mail content management, and mobile device management.

Solutions are packaged to harness the capabilities of best-of-breed technologies including Symantec Brightmail, Riverbed, Fortinet, logMojo, and XenMobile. Solutions are hosted upstream at Securicom's highly-secure, local data centres.

Securicom has offices in Johannesburg, Cape Town and Namibia; and offers its services in 10 other African countries. For more information on Securicom, please visit www.securicom.co.za

Editorial contacts

Kerry Webb
PR Talks
(082) 496 0713