Vulnerabilities / Threats

10/21/2011
11:01 AM
50%
50%

The Three Most Frequently Attacked Mobile Devices

Android devices, tablets, and jailbroken devices top list of riskiest mobile products in the enterprise setting.

10 Companies Driving Mobile Security
10 Companies Driving Mobile Security
(click image for larger view and for slideshow)
As mobile devices continue to become more sophisticated and more integral to employees' everyday work lives, these mini computers in our pockets and handbags continue to become bigger and bigger threats to IT security.

"The proliferation of the devices is happening so fast, and people are now pushing the limits on what they're using the devices for, that IT is having a hard time keeping up," says Dave Hansen, CEO of Numara Software.

So many devices are big risks because critical information runs freely through them and security procedures are ignored for the sake of expediency--these are tools built for convenience, after all. Most troubling, it is often the executive suite that champions fewer security controls so they can continue to use these mobile tools without fetters. That leads to an almost willful ignorance from IT, who would rather not butt heads with senior management.

"It's bizarre. I was a CIO for a Fortune 500 company, and I remember five years ago when I was the one that put passwords on BlackBerrys and thought they were going to burn effigies of me in the lobby," Hansen says. "There was yelling and debating going on at the executive level as to why we would to that."

But ignorance gets us nowhere. In order to mitigate the risks, IT first needs to identify them. The following three devices are some of the biggest security threats to your infrastructure, whether you know it or not.

Android Devices
Devices running on Android OS are increasingly becoming a favorite among hackers for two big reasons: market share and openness.

As the number of Android devices has proliferated in the market, it becomes an ideal medium for attackers to look for common vulnerabilities and quickly spread malware.

Read the rest of this article on Dark Reading.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Darn - typed UNICORN instead of UNICODE.  
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.