Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

1/18/2017
09:20 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Mobile Security Gap Threatens Enterprises

Rush to release, rapid growth in mobile malware is exacerbating the problem, two reports show.

Concerns over the security of the emerging Internet of Things (IoT) have garnered a lot of attention following the massive Mirai botnet-enabled DDoS attacks on Dyn and other major Internet companies late last year. But for many organizations, an equally pressing concern continues to be mobile security.

Two separate surveys released this week show that the growing ubiquity of mobile devices, their increasing sophistication, and the Bring Your Own Device (BYOD) phenomenon continue to cause big problems for organizations across the board.

A Ponemon Institute study - conducted on behalf of IBM Security and Arxan Technologies surveyed 600 IT and IT security practitioners - found that 84% of them are very concerned about malware threats to their mobile applications, compared to 66% who said the same about their IoT application environment.

A sobering 60%, or six out of 10 of the respondents, say their organization had been breached as the result of an insecure mobile application over the past 12 months. The survey showed that less than 30% of mobile applications are tested for vulnerabilities. Some 44% confessed to taking no measures to protect their mobile environment.

Despite the heightened awareness of risk, many organizations appear to lack a sense of urgency in addressing mobile security issues. In fact, a mere 32% of the survey respondents describe their organizations as urgently wanting to secure the mobile application environment.

The second report, from Trend Micro, is based on data collected in 2016 from monitoring systems on the networks of its customers, as well as data from third-party sources.

Trend Micro noted a sharp increase in the number of unique Android malware samples targeted at mobile users—from 10.7 million samples in 2015 to more than 19.2 million in December 2016.

On a global basis, exploits and rooting malware proved to be the biggest security scourge for mobile devices users. But for users in the US, Trend Micro’s analysis showed it was unwanted and potentially harmful applications such as adware and spyware that posed the biggest problems.

In keeping with broader trends, ransomware emerged as a major security threat for mobile device users in 2016. Ransomware families such as SLocker, FLocker, SMSLocker, and Koler contributed to a near doubling in ransomware samples detected by Trend Micro in 2016 compared to a year ago. Other major threats included mobile banking Trojans and an increase in malware such as Dirty COW, Drammer and Quadrooter, which are capable of gaining root access on mobile devices.

Unlike in 2015 when many of the disclosed vulnerabilities were related to Android’s media server process, 2016 witnessed an increase in kernel vulnerabilities, especially in products from Qualcomm, MediaTech, and Nvidia, the Trend Micro report noted.

The Ponemon report showed that as in previous years, many security problems in the mobile domain continue to result from a rush to release software, and a tendency to favor user convenience over safety.

Mandeep Khera, chief marketing officer at Arxan, says one of the biggest takeaways from this year’s survey is that organizations appear to be waiting for either a big visible hack or a regulation to happen before investing in mobile protection.

"This is a huge mistake," Khera says. "One hack could set an organization back dramatically in terms of financial losses, brand damage, recovery costs, and even drop in stock price."

The biggest surprise in the survey was that a vast majority of the respondents believe that they are likely to get hacked, yet most of them are not doing much to protect themselves, he says.

"Although the top-tier companies are doing a much better job of protecting themselves against mobile threats, most of the companies are falling behind," as the number of mobile apps have proliferated. Khera says. "Hackers are finding mobile apps a great place to attack and these apps in the wild have binary code that's vulnerable and unprotected."

Related stories:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DicasM638
50%
50%
DicasM638,
User Rank: Apprentice
9/28/2017 | 12:28:02 PM
Re: Don't click on any link or website shared on groups
Hi Byong, i really understand everything that you say, it's right!
silvasantana
50%
50%
silvasantana,
User Rank: Apprentice
9/22/2017 | 4:08:43 PM
Re: Don't click on any link or website shared on groups
In the old days, the easiest way to send viruses was by email. To this day, I get many viruses via email. But the technology has advanced and now there is the "Spam Box" of the email.
But with the increase in the number of Smartphone Applications, hackers have found another way to steal our data by installing viruses on our phones. Everyone has a smartphone nowadays, but there are not many people who dominate the technology and therefore do not know how to differentiate a suspicious link from a really reliable site.
andrezanon
50%
50%
andrezanon,
User Rank: Apprentice
8/29/2017 | 2:00:29 PM
Re: Don't click on any link or website shared on groups
Totally agree rquerido,

Hackers need to be smarter everyday, but nowadays is more easier the 1998-2000 to catch some virus in our devices.

The best tip is: If you look something weird or suspicious, please, DONT OPEN! ha
rquerido
50%
50%
rquerido,
User Rank: Apprentice
8/25/2017 | 1:13:03 PM
Re: Don't click on any link or website shared on groups
I don't agree if you, bro. If you pay attention and be a little smart, you won't open suspicious site or with strangers extensions. 

Nowadays its easy to create "fake scan site" like "Netflix 6 free months accounts". You ONLY just need to check the urls and don't put your information on that. 

Doing that, you won't have problems! <a href="https://www.comprecftv.com.br"> :) </a>
rubenscardos0
100%
0%
rubenscardos0,
User Rank: Apprentice
8/9/2017 | 5:24:26 PM
Re: Don't click on any link or website shared on groups
Hey Andre!

Whatsapp and Facebook Messenger now are infected by virus and people clicking on suspicious links. This is much dangerous!

And I agree with you when you said we dont think twice to click on a link sent by our friends. But like those old emails, we need to think about or we going to enter on website that we dont know. 
bricesap5
50%
50%
bricesap5,
User Rank: Apprentice
2/6/2017 | 10:23:51 AM
Technlogy and Amazon, Google, Groupon,...
That's true that influence of technology is very high and it getting higher and higher with all the virtual assistants from Google, Amazon, Groupon and the others
andrejones
50%
50%
andrejones,
User Rank: Apprentice
2/6/2017 | 7:33:41 AM
Don't click on any link or website shared on groups
Most of my friends who had their mobile phones infected by viruses clicked on suspicious links sent by one of their contacts. Obviously, if the link comes from a trusted person, you won't think twice before you click on it, but this is very dangerous.

Always double check if that person really had the intention to send that message.
annmariya
0%
100%
annmariya,
User Rank: Apprentice
1/18/2017 | 11:01:07 PM
Take Care
The influence of technology is very high in our daily life. Along with good impact it also provide some bad threats in our life. The chances of malware attact are very high and must take care while using. 
7 Truths About BEC Scams
Ericka Chickowski, Contributing Writer,  6/13/2019
DNS Firewalls Could Prevent Billions in Losses to Cybercrime
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2019
Cognitive Bias Can Hamper Security Decisions
Kelly Sheridan, Staff Editor, Dark Reading,  6/10/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7472
PUBLISHED: 2019-06-15
The &quot;Count per Day&quot; plugin before 3.2.6 for WordPress allows XSS via the wp-admin/?page=cpd_metaboxes daytoshow parameter.
CVE-2019-12839
PUBLISHED: 2019-06-15
In OrangeHRM 4.3.1 and before, there is an input validation error within admin/listMailConfiguration (txtSendmailPath parameter) that allows authenticated attackers to achieve arbitrary command execution.
CVE-2019-12840
PUBLISHED: 2019-06-15
In Webmin through 1.910, any user authorized to the &quot;Package Updates&quot; module can execute arbitrary commands with root privileges via the data parameter to update.cgi.
CVE-2019-12835
PUBLISHED: 2019-06-15
formats/xml.cpp in Leanify 0.4.3 allows for a controlled out-of-bounds write in xml_memory_writer::write via characters that require escaping.
CVE-2019-12830
PUBLISHED: 2019-06-15
In MyBB before 1.8.21, an attacker can exploit a parsing flaw in the Private Message / Post renderer that leads to [video] BBCode persistent XSS to take over any forum account, aka a nested video MyCode issue.