Mobile

3/2/2015
07:00 AM
Ericka Chickowski
Ericka Chickowski
Slideshows
Connect Directly
Twitter
Twitter
RSS
E-Mail
50%
50%

Mobile Security By The Numbers

Rounding up the latest research on mobile malware and security practices.
Previous
1 of 7
Next

As ubiquity of mobility paired with the availability of cloud continues to drive major technological disruptions within just about every type of enterprise transacting business today, CIOs and CISOs are increasingly put on notice to incorporate mobile into their security plans or risk irrelevance. Over the past several months, numerous surveys and studies have done a good job offering up some statistical proof points about the scope of the mobile security dilemma. We've broken down some of the most salient stats for our readers.

Mobile Fraud Estimates
Mobile fraud is on the rise, and as enterprises struggle to meet the challenges, the costs keep piling up. According to a research report by J. Gold Associates created on behalf of RSA and TeleSign, 63 percent of enterprises say they've experienced a 5 percent loss in revenue or greater due to mobile fraud. 
Source: TeleSign

Mobile Fraud Estimates

Mobile fraud is on the rise, and as enterprises struggle to meet the challenges, the costs keep piling up. According to a research report by J. Gold Associates created on behalf of RSA and TeleSign, 63 percent of enterprises say they've experienced a 5 percent loss in revenue or greater due to mobile fraud.

Source: TeleSign

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Previous
1 of 7
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
flexcapacitr
50%
50%
flexcapacitr,
User Rank: Apprentice
3/12/2015 | 4:40:47 PM
Re: Gating apps
True to a point.  Android is the primary target because its the largest & higher chance of success...smaller pool iphone lesser statistical chance of success.  If your designing malware which would you attack? this was mentioned at BHat 2012. These TOE evals will change based upon the obvious user base and easily exploitable CVE's.
AntonioL282
0%
100%
AntonioL282,
User Rank: Apprentice
3/10/2015 | 4:58:08 AM
Android Malware report
The National CyberSecurity Institute of Spain (INCIBE) has released a complete report of the current situation of the malware in Android devices. https://www.incibe.es/CERT_en/publications/Studies/android_malware_situation_en
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
3/7/2015 | 11:32:04 PM
Gating apps
Even though iOS has technically has had more vulnerabilities of late, 96% of mobile malware targets Android -- because it's so darn easy through the unregulated, ungated Google app store!  (On iOS, hackers have to resort to SMS and email phishing.)

If Google refuses to gate its apps, I think it's high time for the enterprise to finally put Android to bed.
Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
Why Enterprises Can't Ignore Third-Party IoT-Related Risks
Charlie Miller, Senior Vice President, The Santa Fe Group,  5/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11232
PUBLISHED: 2018-05-18
The etm_setup_aux function in drivers/hwtracing/coresight/coresight-etm-perf.c in the Linux kernel before 4.10.2 allows attackers to cause a denial of service (panic) because a parameter is incorrectly used as a local variable.
CVE-2017-15855
PUBLISHED: 2018-05-17
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel, the camera application triggers "user-memory-access" issue as the Camera CPP module Linux driver directly accesses the application provided buffer, which resides in u...
CVE-2018-3567
PUBLISHED: 2018-05-17
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel, a buffer overflow vulnerability exists in WLAN while processing the HTT_T2H_MSG_TYPE_PEER_MAP or HTT_T2H_MSG_TYPE_PEER_UNMAP messages.
CVE-2018-3568
PUBLISHED: 2018-05-17
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel, in __wlan_hdd_cfg80211_vendor_scan(), a buffer overwrite can potentially occur.
CVE-2018-5827
PUBLISHED: 2018-05-17
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel, a buffer overflow vulnerability exists in WLAN while processing an extscan hotlist event.