Agenda
Why are cyber attackers interested in your mobile devices?
How can my device be hacked?
How can I protect myself?
2
4
46B mobile apps
downloaded in
2012 –
Gartner1
400B stars in our
galaxy
2017 more app
downloads
than stars
You are not alone!
1http://www.gartner.com/newsroom/id/2153215
Top Traffic/Transportation Apps
60% have location permissions or monitor my device’s location
46% interact with other types of Sensitive Data
26% have access to my contacts
5
Analysis conducted by Veracode Mobile App Reputation Service (MARS)
http://www.veracode.com/blog/2013/08/developers-guide-to-building-secure-mobile-applications-infographic/
http://www.veracode.com/blog/2013/08/developers-guide-to-building-secure-mobile-applications-infographic/
How Attacks Can Happen
MY
BANK
APP
BANK
Services
Stored
transaction
number
MY
OTHER
APP
Read
SMS
logs
OTHER APP
Services
No control over how
or if this data is used
Export
data
https://info.veracode.com/webinar-what-are-employees-mobile-apps-doing-behind-your-back.html
How Attacks Can Happen
Malicious
Code
Servers
Check for
“updates”
MY COOL APP
Install
rootkit
exploits
Secretly
become a
super user
https://info.veracode.com/webinar-what-are-employees-mobile-apps-doing-behind-your-back.html
Application Passwords
Use at least one special character
Use at least one number
Try using password generators and vaults
No words found in a dictionary
Family names, birth city, sports teams or guessable words
Guessable words with changed letters
DO DO NOT
P@ssw0rd
Veracode!
Summary
Why are cyber attackers interested in your mobile devices?
Your phone is a digital representation of your life
If attackers can mimic your life they can put your identity and your workplace at risk
How can my device be hacked?
Theft
Risky apps
How can I protect myself & kids?
Lock your phone
Use non-guessable passwords
Beware of free apps
Always check app permissions
18