show a rise of mobile apps that exploit the trust people have in brands and major companies (Miners, 2014).
Even Apple fans are not immune to malware slipping past the cracks and making its way onto the Apple App Store. In 2012, a Russian language app, “Find and Call” was available on the App Store for download (Bonnington, 2012). Essentially, the app is a Trojan that steals the user’s contact list and GPS coordinates then uploads the information to a remote server. Once the information is on the remote server, it sends spam to the victim’s contacts telling them about the Find and Call app (Bonnington, 2012). Although the App Store has been malware free for five years, this app did pass through Apple’s screening process and make its way onto the App Store (Bonnington, 2012).
Malware on personal devices in a BYOD setting can be dangerous to the organization. Employees who accidently download malicious apps to their personal devices can potentially give hackers unauthorized access to corporate data. Coupled with other threats like jail-broken phones, preinstalled malware prior to shipping and mobile vulnerabilities can be a major nightmare to the IT department implementing BYOD (“Implementing BYOD,” 2012).
Another way that corporate data is compromised is through disgruntled or fired employees. Most employees may retain some data after they leave the organization and will notify the IT department to properly discard the data. However, fired or disgruntled employees usually
The same data for sure can also be retrieved by larger corporations and capable hackers. And let's not forget about all the surveillance cameras at the offices, building entrances, subway stations. Information from them flocks to computers that are also connected to the Internet. What are the basic methods of
However mobile devices also represent a significant risk to information security and data security as, if the appropriate security applications and procedures are not applied, they can be a conduit for unauthorized access to the Eastern Widgets’ data and IT infrastructure. This can subsequently lead to data leakage and system infection. Eastern Widgets has a requirement to protect its information assets in order to safeguard its customers, intellectual property and reputation. This policy outlines a set of practices and requirements for the safe use of mobile devices.
For this assignment, I chose to analyze a comic about something not too many people think about- the downloading of apps for your phone or your computer. The comic, one of many in the "Dilbert" comic series, portrays a man calling tech support about his surprise over one of the company's apps stealing his information. However, instead of telling the man that they would rectify the situation, "Dogbert" gives the man an option- upgrade to the paid subscription, or have is browser history leaked- showing the dangers of allowing applications to have our information just by simply downloading it.
Mission Health's Bring Your Own Device (BYOD) movement is well underway with a recent survey conducted at the hospital revealing that 90% of more than 10,000 of our employees use their mobile devices for both personal and work purposes. While permitting employees to use personal mobile devices to access corporate resources increases employee satisfaction, employee productivity, reduces capital costs, and ultimately improves the quality of care and increase operational efficiencies it introduces significant security risks.
The introduction of mobile devices in the workplace has been on the rise and there is no denying that these devices are transforming how companies do business. This has introduced the BYOD or Bring Your Own Device model in the workplace and its becoming more popular every day. BYOD is a policy that accepts employees bringing personally owned mobile devices to their workplace and using them to access company data such as email, file servers and databases as well as their personal applications and data. But as data transmissions increase with these devices so does the chances of them being hacked and the burden of successfully managing the mobile devices is laid upon the IT departments. One of the
Lawton, G. (2008). Is it finally time to worry about mobile malware? Computer, 41(5), 12-14.
Keywords— Apple iOS; Google; Android; Nexus5; touch-id; iPhone; file transfer; Proprietary Apps; iMessage; iTunes; Bluetooth; Wi-Fi; iPad; Mac book; Personal Computer; Personal assistant application; Electronic Wallet; SIRI; Google Now; notification center; Autocorrect; Passbook; LTE; default applications; Privacy settings; shortcuts; customizations; Pedometer; accelerometers; Fitbit; mobile malware;
Smartphones are a ripe target for hackers for several reasons, one is that smartphones have limited security and antimalware protection. Second malware creators can access email and contact lists, monitor personal communications, and capture vital data such as
diffusion of the BYOD (Bring Your Own Device) phenomenon. BYOD is the latest trend hitting businesses where employees are bringing their own personal mobile devices. Some of these devices include smartphones and tablets which are brought into their place of work, and used on the corporate network for purposes such as accessing files, email servers, and databases. Over the past few years, employees in many organizations are bringing their own personal devices to the work
Given the grim numbers regarding the increasing numbers of malicious apps, could it really get any worse? Unfortunately, the answer to
Abstract— A new trend of implementing Bring Your Own Device (BYOD) as an IT policy is being adopted by companies worldwide. It permits employees to bring their own portable devices like tablets,
As technology advances and portable devices such as laptops, tablets and smartphones being developed, the ‘bring your own device’ trend has been born. BYOD refers to a movement that has encouraged companies to allow their employees to bring their personal devices at work and be able to use them to access the company network. These portable devices not only make work easier, but they are also convenient as they allow employees to work from anywhere and not just their company offices. Although there are benefits to this trend, with it come disadvantages that are causing concerns and making some companies wonder if allowing this policy is a good idea.
Abstract—If you take a quick visit to https://www.android.com , one of the first things you will see is the company’s claim that their operating system powers more than a billion devices across the globe. These devices include phones, tablets, watches, TVs, cars and more to come. Smartphones are used in many ways to include accessing sensitive documents, banking and controlling security systems. Various sources indicate that the smartphone market space is dominated by devices running the popular Android operating system. Two of the reasons why the Android OS is so popular is because of its open architecture and its application programming interface, or APIs. With such popularity, unscrupulous code developers see these devices as an opportunity to take advantage of unsuspecting users. Malware apps have drastically increased from 2010 to 2014 from a little over 1200 known variants to well over 1.5 million with over 90% of those designed for the Android OS. With such a large amount of malware and the majority of it designed for the Android OS, this paper will look at some of the various types of malware and the different methods of how they are deployed. We will also look at some of the methods employed to detect and defend against malware and the effectiveness of those methods.
The trend of BYOD is enabling “organisations to take advantage of new technology faster” (Defence Signals Directorate, 2014), which is very important in today’s rapidly evolving ecosystem of devices available on the planet. The traditional course of action for an IT department is that they usually supply a smartphone/laptop/tablet to a user, which is intended to last them a few years. As a result over time the device falls out of line with the expected speeds and features of the latest devices on the market, potentially annoying the user. Taking advantage of new technology leads users to being reinforced with the expected standards of current speed and power, which “can often save time and money” (QLD Government, 2015), and also enable the user to be protected with the latest security available, which is crucial when a device is containing sensitive data.
Malicious code is "Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality, integrity, or availability of an information system. 1 Today, as ubiquitous computing is fast becoming a reality and information systems are becoming a part of everything from mobile phones to cars, any threat to an information system represents a risk to hardware, software, data, and the users that depend on their confidentiality, integrity, and availability. This paper surveys the topic of malicious code by identifying malicious code, discussing how social engineering is related to malicious code, describing its threats, listing ways and