Verizon: key security threats in 2012

Verizon: key security threats in 2012

Verizon Communications  |   December 23, 2011
1. Mobile malware is on the rise. Malware targeting mobile devices will continue to increase, and enterprises will wrestle with how to protect users. Obvious targets will be smartphones and tablets, with the hardest hit likely to be Android-based devices, given that operating system’s large market share and open innovation platform. All mobile platforms will experience an increase in mobile attacks. 
 
2. Criminals target and infect app stores. Infected applications, rather than browser-based downloads, will be the main sources of attack. Because they are not policed well, unauthorized application stores will be the predominant source of mobile malware. Cybercriminals will post their infected applications here to attempt to lure trusting users into downloading rogue applications.
 
Cybercriminals also will find ways to get their applications posted into authorized application stores. And infections can easily spread beyond the smartphone and into a corporate network, upping the ante on risk.
 
3. Application scoring systems will be developed and implemented. To reassure users, organizations will want to have their application source code reviewed by third parties. Similarly, organizations will want to be sure that the applications approved for use on workers’ devices meet a certain standard. It is anticipated that the industry will develop a scoring system that helps ensure that users only download appropriate, corporate-sanctioned applications to business devices.
 
4. Emergence of bank-friendly applications with built-in security. Mobile devices will increasingly be used to view banking information, transfer money, donate to charities, and make payments for goods and services, presenting an opportunity for cybercriminals, who will find ways to circumvent protections. To help ensure the security of online banking, the banking industry is likely to begin to offer applications that have strong, built-in security layers.
 
5. Hyper-connectivity leads to growing identity and privacy challenges. In today’s business environment, more users need to legitimately access more data from more places. This requires the protection of data at every access point by using stronger credentials, deploying more secure, partner-accessible systems, and improving log management and analysis. Compounding the issue are a new age of cross-platform malicious code, aimed at sabotage, and mounting concerns about privacy. Enterprises will no longer be able to ignore this problem in 2012, and will have to make some hard choices.
 

Bigbox

TelcoStrat 288

TELCO STRATEGIES CONFERENCE
May 7-8, Jakarta
Join telco CxOs from around Asia to discuss:
• Changing the way telcos operate
• New service offerings
• Restructuring for innovation
See the conference agenda >>

Transmode's Sten Nordell explains why Asia is ahead of the game in mobile fronthaul, and how WDM-PON’s time has finally come

SignUpTAenews

Frontpage Content by Category with Image

Activists petition for the withdrawal of the Newborn-to-Toddler Apptivity Seat

 

Telecomasia.net full website

© 2012 Questex Asia Ltd., a Questex Media Group company. All rights reserved. Reproduction in whole or in part is prohibited. Please send any technical comments or questions to our webmaster.