Mobile compromise: science fiction or reality?
Source: BI-ME , Author: Posted by BI-ME staff
Posted: Tue June 5, 2012 1:38 pm

UAE. Trend Micro, the global cloud security leader, today released a short film (http://youtu.be/9n8OZyo4nG0) to raise awareness about the risks associated with our increasing use of smartphones.

Smartphones are now outselling PCs, with 850,000 Android devices activated every day, 70m iOS devices sold in the first three months of 2012, and over 35 billion apps downloaded by the end of 2011.

Cyber criminals are increasingly focusing their attention on these devices for financial gain, through targeted, persistent attacks and by hiding malware in legitimate looking mobile apps.

The video features Rik Ferguson, Director of Security, Research and Communication, presenting a real-time hacking scenario which takes us behind the scenes as a cyber criminal looks to exploit his victims.

The video shows how a simple app can transform a smartphone into an espionage tool in the hands of criminals - recording conversations, stealing text messages and spying on private meetings. It also details the dangers of downloading un-vetted applications from third party app stores.

Unfortunately, users often leave their smartphones unprotected in the belief that they cannot fall victims to crime, making the hacker’s job even easier.

"Cyber criminals are looking for an easy way to make money and are targeting smartphones through the use of social engineering techniques in order to capture both personal and company confidential information”, said Ferguson.

“Corporate espionage has never been so easy. See how a simple app can transform your smartphone into an espionage tool in the hands of criminals, able to record your conversations, steal your text messages and spy on your private meetings,” added Ferguson.

As with most cybercrime today, smartphones infected with malware will not typically show signs of unusual activity. Here are some simple measures you should take in order to protect your smartphone:
• Always lock your device with a password
• Stick to the official app distribution channels, however tempting other offers may sound
• Check the publisher’s reputation and the permissions
• Invest in effective mobile security and management software

About Trend Micro
Trend Micro Incorporated (TYO: 4704;TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers.

A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits our customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments.

Powered by the industry-leading Trend Micro™ Smart Protection Network™ cloud computing security infrastructure, our products and services stop threats where they emerge – from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.

 

MIDDLE EAST BUSINESS COMMENT & ANALYSIS

date:Posted: August 1, 2014
INTERNATIONAL. The Israelis and Palestinians have been trapped for decades between delusions and denial and both have resorted to ideological and religious dogmas that dismiss with conviction any factual evidence to the contrary.
date:Posted: August 1, 2014
INTERNATIONAL. Long-term infrastructure debt poses a significant pricing challenge with no market prices, private cash flow data scattered amongst originators, and covenant structures creating "embedded options" that are not taken into account in standard valuation models.
date:Posted: July 31, 2014
UAE. Rotate into high-yield bonds which offer better value; Large IPOs could drain money out of stock markets and raise volatility ahead, says Emirates NBD investment chief.
INTERNATIONAL. The Israelis and Palestinians have been trapped for decades between delusions and denial and both have resorted to ideological and religious dogmas that dismiss with conviction any factual evidence to the contrary.
dhgate