Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

12/9/2010
02:47 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Holiday Rush Leaves Smartphones At Risk

Symantec study finds smartphone users planning to use their mobile devices for work, personal purposes during the holidays

Christmas lists aren't the only thing users will be checking during the holidays: More than 60 percent of smartphone users say they plan to access sensitive data on their handhelds while they are away from the office.

A new study by Symantec found that all of the respondents use smartphones for work in some way, and that around 68 percent plan to use their smartphones for browsing the Web while on holiday -- 81 percent for work-related email; 77 percent, personal email; 68 percent, social networking; and 17 percent, viewing or working on work-related documents.

The good news is that only 20 percent will use their smartphones for online shopping, notes Symantec's Spencer Parkinson. "The interesting thing about this finding is that 62 percent of respondents do not simply plan to access confidential data on their smartphones, but expect they will need to access this sensitive data while away from the office during the holiday season. Sure, respondents might access and view this data in the privacy of their home, but in all likelihood many will do so in public, possibly while standing in a crowded shopping mall or sitting in a movie theater with strangers all around," Parkinson blogged. "The point here is that mobile device users need to be aware of their surroundings and the potential criminals lurking over their shoulder dying for a sneak peek at those employee social security numbers or that network username and password."

Close to 30 percent said they would be very likely to open an unsolicited text message, and 14 percent, an unsolicited email. Around 18 percent said they note license agreements for apps they download on their smartphones. "Since these messages can lead to malware, phishing, and other threats just the same as other more traditional methods, users need to apply the same discretion they use in opening unsolicited emails to text messages," Dickinson said in the blog post.

Close to 70 percent said their No. 1 security worry for their smartphone is loss or theft; 56 percent said mobile malware is their No. 2 concern.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Cybersecurity Bounces Back, but Talent Still Absent
Simone Petrella, Chief Executive Officer, CyberVista,  9/16/2020
Meet the Computer Scientist Who Helped Push for Paper Ballots
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: Exactly
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7734
PUBLISHED: 2020-09-22
All versions of package cabot are vulnerable to Cross-site Scripting (XSS) via the Endpoint column.
CVE-2020-6564
PUBLISHED: 2020-09-21
Inappropriate implementation in permissions in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to spoof the contents of a permission dialog via a crafted HTML page.
CVE-2020-6565
PUBLISHED: 2020-09-21
Inappropriate implementation in Omnibox in Google Chrome on iOS prior to 85.0.4183.83 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
CVE-2020-6566
PUBLISHED: 2020-09-21
Insufficient policy enforcement in media in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
CVE-2020-6567
PUBLISHED: 2020-09-21
Insufficient validation of untrusted input in command line handling in Google Chrome on Windows prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.