Mobile compromise: science fiction or reality?
Source: BI-ME , Author: Posted by BI-ME staff
Posted: Tue June 5, 2012 1:38 pm

UAE. Trend Micro, the global cloud security leader, today released a short film (http://youtu.be/9n8OZyo4nG0) to raise awareness about the risks associated with our increasing use of smartphones.

Smartphones are now outselling PCs, with 850,000 Android devices activated every day, 70m iOS devices sold in the first three months of 2012, and over 35 billion apps downloaded by the end of 2011.

Cyber criminals are increasingly focusing their attention on these devices for financial gain, through targeted, persistent attacks and by hiding malware in legitimate looking mobile apps.

The video features Rik Ferguson, Director of Security, Research and Communication, presenting a real-time hacking scenario which takes us behind the scenes as a cyber criminal looks to exploit his victims.

The video shows how a simple app can transform a smartphone into an espionage tool in the hands of criminals - recording conversations, stealing text messages and spying on private meetings. It also details the dangers of downloading un-vetted applications from third party app stores.

Unfortunately, users often leave their smartphones unprotected in the belief that they cannot fall victims to crime, making the hacker’s job even easier.

"Cyber criminals are looking for an easy way to make money and are targeting smartphones through the use of social engineering techniques in order to capture both personal and company confidential information”, said Ferguson.

“Corporate espionage has never been so easy. See how a simple app can transform your smartphone into an espionage tool in the hands of criminals, able to record your conversations, steal your text messages and spy on your private meetings,” added Ferguson.

As with most cybercrime today, smartphones infected with malware will not typically show signs of unusual activity. Here are some simple measures you should take in order to protect your smartphone:
• Always lock your device with a password
• Stick to the official app distribution channels, however tempting other offers may sound
• Check the publisher’s reputation and the permissions
• Invest in effective mobile security and management software

About Trend Micro
Trend Micro Incorporated (TYO: 4704;TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers.

A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits our customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments.

Powered by the industry-leading Trend Micro™ Smart Protection Network™ cloud computing security infrastructure, our products and services stop threats where they emerge – from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.

 

MIDDLE EAST BUSINESS COMMENT & ANALYSIS

date:Posted: April 17, 2014
KUWAIT. According to a newly released report by Kuwait Finance House Research, the global sukuk market saw a modest volume of US$31.14 billion in new sukuk issuances in 1Q2014. This volume represents a drop of 9.82% compared to US$34.53 billion worth of issuances in 1Q13.
date:Posted: April 16, 2014
INTERNATIONAL. The WGC pointed out that the Chinese bank savings amount to US$7.5 trillion but only about US$300 billionn is allocated to gold, signifying the potential for gold demand to grow as Chinese wealth climbs.
date:Posted: April 16, 2014
UAE. "A similar drop to 2013 is unlikely. Those who wanted to get out of gold did, and the rest of 2014 will probably be a year of sideways trading."
SAUDI ARABIA. The GCC said in a statement that foreign ministers of the six-member body had met in Riyadh for a comprehensive review of measures used to implement foreign and security policies.
dhgate