PPT-Ch 5: Mobile Malware CNIT 128:
Author : priscilla | Published Date : 2023-06-24
Hacking Mobile Devices Increase in Mobile Malware From link Ch 5a Early Malware LibertyCrack 2000 Trojan masquerading as pirated software for Palm OS Restored device
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "Ch 5: Mobile Malware CNIT 128:" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Ch 5: Mobile Malware CNIT 128:: Transcript
Hacking Mobile Devices Increase in Mobile Malware From link Ch 5a Early Malware LibertyCrack 2000 Trojan masquerading as pirated software for Palm OS Restored device to factory defaults Early Malware. Possible attack threats to mobile devices. Network exploit. Hackers takes advantage of vulnerability or flaw of user’s web browser on mobile device in . WiFi. communication to attack victims.. Hackers send malicious code/data from malicious logic websites to victim’s browser after user browses the malicious page and the malicious code will take over the control to get all sensitive data on the victim’s device.. MSc Information Security . Project 2013/2014. Author: Nicholas . Aquilina. Supervisor: . Dr. Konstantinos . Markantonakis. Aims and . Objectives of Project. Understand and . analyse. . current malware strategies. Malware Propagation in Mobile . Phone Networks. Chris Fleizach. 1. , Michael Liljenstam. 3. , . Per . Johansson. 2. , Geoffrey . M. . Voelker. 1. . and . András. Méhes. 3. 1. . 2. . 3. Introduction. Ransomware, RAT’s, & the Compromised App Market. Nick Houghton. Mobile Ransomware. 2 main types: . Cryptolockers. and . Blockers. Cryptolockers. encrypt files and data. Blockers prevent browser/app use. 2016. IBM X-Force . Threat . Intelligence Report. Chris Poulin. Research Strategist, X-Force. IBM Security. April 2016. IBM . X-Force. is the foundation for advanced security and threat research across the IBM Security Framework.. Mobile Devices vs. Desktops. Physical Theft . – Mobile devices are now more prone to physical theft unlike Desktops they are small and mobile.. More Areas for Error– . In essence mobile devices are seen as mini computers however mobile security must now take into account SMS, MMS, Bluetooth etc. . Outline. Introduction. Types . of Malware. Malware examples. How . Malware Spreads. Prevention. AndroRAT. Hands-on Lab. Introduction. Mobile Security has become a fast growing issue. Nearly 100,000 new malicious programs for mobile devices were detected in 2013 (Kaspersky Lab). Mariantonietta La Polla. Fabio Martinelli. Daniele Sgandurra. Outline. Introduction. Mobile Technologies. Mobile Malware. Attacks on Mobile Devices. Security Solutions For Mobile Devices. Conclusions. Insert Copyright statement here. See notes page for Copyright Text.. February 9th, 2017. Contributing Analyst, Patrick Donegan. Agenda. . Key Trends. Mobile Security Threats. Progress In Software Programmability. Air, water, food… mobile devices. Mobile devices are now an integral part of our lives. 72%. growth in worldwide . smartphone. sales in 2010. 400x. September 2009 - . 0.02%. January 2011 - . 8.09%. CS 155. Spring . 2015. Outline. Mobile malware. Common cases involve command and control, information theft. Identifying malware. Detect at app store rather than on platform. C. lassification study of mobile web apps. Strategies. Apple iOS. Mobile Device Security - State-of-Play. Permissions. Limited access to approved data/systems. Access Control. Password & Idle . screen . locking. Isolation. Limits . an . apps ability . The Cloud Generation . Andrew Joseph . Director- SEP Mobile . Old Endpoint vs. New Endpoint. IPS. IDS. FIREWALL. USB. SECURITY. DLP. DATA ENCRYPTION. WIRELESS SECURITY. APPLICATION CONTROL. AV. ?. Mobile Devices Represent the . Hacking Mobile Devices. Current Generation. Scenarios. Mobile banking apps. NFC-based or barcode-based payment apps used by consumers to purchase goods. Premium-rated SMS messages to purchase virtual goods within games, or music.
Download Document
Here is the link to download the presentation.
"Ch 5: Mobile Malware CNIT 128:"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents