(In)Security of Mobile Banking
|
|
|
- Magnus Wood
- 10 years ago
- Views:
Transcription
1 (In)Security of Mobile Banking Eric Filiol and Paul Irolla Laboratoire de Cryptologie et Virologie Opérationnelles École Supérieure d Informatique, Électronique, Automatique 31C3 - Hamburg - December 27 th, 2014
2 Table of contents Introduction & Background: the DAVFI Project Tools Static analysis APK Database Dynamic analysis Results on a Few Apps A Few Statistics JP Morgan Access BNP Paribas Sberbank Bradesco Conclusion & Future Work
3 DAVFI Project Two-year project to develop a sovereign and trusted AV for Android, Linux and Windows. Funded partly by the French Government (6 millions euros with 0.35 % of funding). Intellectual property transferred to Nov It for marketing under the brand Uhuru.Mobile and Uhuru-AM. Normally, free/open versions should be released by Nov It for non commercial use. We will deliver a free/open fork version for Linux by mid March (OpenDAVFI Linux). More info on
4 DAVFI Android Transferred to Nov It on October 17th, Based on Cyanogen and AOSP sources. We switched from a simple AV application to a complete antiviral operation system based on Android with additional security features: File system encryption, SMS encryption, VoIP encryption, dedicated secure and certified application market... One of the key features is that all app available on the secure market is fully analyzed (static & dynamic analysis including possible reversing steps). Whenever safe AND compliant to our security policy (see further), the app is certified & signed before put on the secure market. More info on
5 Trust Policy Legit apps can be malevolent when it comes to targeted marketing and user tracking capabilities. A few apps contains severe vulnerabilities. The malware definition needs to be extended.
6 Trust Policy (Contnd) An app is trustworthy according to our Trust Policy if and only if: It does not contain hidden functionalities. User informations collection must be motivated by explicit functionalities. Web communications involving personal user informations must be encrypted. The app does not contain known vulnerabilities.
7 Why Bank Apps? Progressively, banks are forcing users to move towards mobile banking. Because our money is a serious business. Our privacy and data confidentiality is an even more critical issue! So, we expect them to be at the edge of security and confidentiality and to take care of our core interests. All banks have been contacted to provide (for free) all technical details. Up to now, only a very few have answered. A few (BNP Paribas, CA) are currently correcting part of the problems reported.
8 Tools About 1800 malware from malgenome project and contagiodump. About 1800 genuine open sources gathered from fdroid and Google code projects. Tools we have developped: Egide: advanced static analysis and malware detection tool. Tarentula: web crawling tool to collect apps. Panoptes: advanced dynamic analysis tool (network communications analysis at runtime). These tools are non public at the present time.
9 Static analysis- Egide A program that reverses apps and generates a report which is a guide in the source code. Tasks: reverses to smali/java, detects risky behaviors/methods/sources/sinks, computes the control flow graph through entry point methods, computes statistics on group of apps, computes similarites between an app and a group of apps. Generates a neural network and trains it on an app database, generates reports and graphes... Demos and examples of reports.
10 Static analysis- Egide - Exposed
11 Static analysis- Egide Proved its effectiveness on new malwares. But not entirely satisfying. A few samples never get well classified. The malware database needs to be extended.
12 APK Database- Context Database of classified applications is the sinews of antiviral war. A subject rarely explained or detailed in security papers. A sophisticated data mining algorithm is useless with a poor database. So how to populate a database for training some edgy machine learning algorithm? How does the others do?
13 APK Database- Howto Several universities gather malware and propose to share them. darp/drebin/ Some websites share Android malware It is a good starting point but not enough.
14 APK Database- AV malware DB
15 APK Database- Tarentula Crawl alternative Android market from USA, China, Russia etc. Crawl public ftp. Crawl torrents. Crawl Google Play. We have stopped crawling at 280K unique apps.
16 APK Database- Tarentula Structure
17 Dynamic analysis- Panoptes - Briefly Task: reveals communications between an app and internet. Open a fake access point and listen HTTP/HTTPS/POP/IMAP communications. Generates a tree of communication informations.
18 Dynamic analysis- Panoptes - Does it Bypass SSL Encryption? A fake Certification Authority is in the phone. SSL/TLS requests are intercepted, terminated and a new one is initiated to the original destination address. The server response is copied, embedded in a SSL layer and signed with our fake Certification Authority. Panoptes demo.
19 Apps Analyzed At the present we have analyzed 27 apps (more to come in the forthcoming weeks). BNP (France) LCL (France) Crédit Agricole (France) Sofinco (France) Société Générale (France) BforBank (France) Finaref (France) Bradesco (Brazil) BMCE (Morocco) Barclay (UK) UBS (Switzerland) JP Morgan (USA) Wells Fargo (USA) Bank of America (USA) Burke and Herbert (USA) PNC Financial Service (USA) Commerzbank (Germany) Deutsche Bank AG (Germany) HSBC (UK) Santander Group (Spain) Sberbank (Russia) Mizohobank (Japan) Agricultural Bank of China (China) State Bank of India (India) Hapoalim Bank (Israel) Shahr Bank Iran) HanaNBank (Korea)
20 A Few Statistics - Permissions INTERNET 100% SEND SMS 7% ACCESS NETWORK STATE 96% RESTART PACKAGES 7% ACCESS FINE LOCATION 71% CHANGE NETWORK STATE 7% WRITE EXTERNAL STORAGE 68% READ SMS 7% READ PHONE STATE 61% RECORD AUDIO 7% CAMERA 54% READ LOGS 7% ACCESS COARSE LOCATION 54% ACCESS LOCATION EXTRA COMMANDS 7% c2dm.permission.receive 46% KILL BACKGROUND PROCESSES 7% CALL PHONE 39% ACCESS NETWORK 4% ACCESS WIFI STATE 39% GET TASKS 4% READ CONTACTS 32% RECEIVE MMS 4% gsf.permission.read GSERVICES 29% MOUNT UNMOUNT FILESYSTEMS 4% GET ACCOUNTS 29% DISABLE KEYGUARD 4% ACCESS MOCK LOCATION 14% READ OWNER DATA 4% READ EXTERNAL STORAGE 14% READ CALENDAR 4% RECEIVE BOOT COMPLETED 14% WRITE CALENDAR 4% WRITE CONTACTS 11% BROADCAST STICKY 4% NFC 11% SMARTCARD 4% RECEIVE SMS 11% NFC TRANSACTION 4% WRITE SETTINGS 11% ACCESS DOWNLOAD MANAGER 4% CHANGE WIFI STATE 11% READ CALL LOG 4%
21 Some statistics - Behaviors Load app content from web 96% Can use clear text communications 89% Get OS name 75% Get android unique id 71% Use addjavascriptinterface 61% Get IMEI 54% Get OS version 54% User tracking capabilities 50% Get MAC address 25% Get MSISDN 18% Get IMSI 11% Get CID 7% Get LAC 4% Get phone serial number 4% Get router MAC address 4%
22 JP Morgan Access Demo
23 JP Morgan Access oxrohccrti/m1w9nc/7nqwanljaa8forrxcj2s1eithndeuw6ger L7NQogAnOFtPdYlwP1Gh2+0aNqsnrKeGbw== ########## MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAMx6N9b4yaIFC60o f8ywu1e08sh4kroldfjrkmtvazokg2p3uuwmt5ouwbyyehwssl +btd6dmciqrwr2isw09dkcaweaaq== ########## Root Call Blocker,LBE Privacy Guard,Dual Mount SD Widget, Hexamob Recovery Pro,Total Commander,Boot Man
24 JP Morgan Access String[] arrayofstring = str2.split( ########## );... RootTools.log( Executing sh Commands : + arrayofstring5[0] + arrayofstring5[1]);... List locallist = runcmd(arrayofstring6);
25 JP Morgan Access Dynamic Analysis : An encrypted string is received. APK Instrumentation reveals it contains signatures and lists of strings. Static Analysis reveals some strings are sent directly into a shell. Well, that s a remote shell, isn t it?
26 BNP Paribas Demo
27 BNP Paribas Dynamic analysis failed! Static analysis reveals that addjavascriptinterface loads plaintext javascript. That means MITM attackers can gain a reverse shell on vulnerable phones.
28 Sberbank Demo
29 Sberbank wifinetworks= :-45,0060b3e268c8:- 66,4018B1CF2655:-77,4018B1CF2255:-77,4018B1CF6455:- 79,C8D3A352B1B0:-78,4018B1CF6 515:-83,586D8F747EC7:-85,4018B1CF2654:- 76,4018B1CF2254:-83,4018B1CF6454:-84,4018B1CF6514:- 88,4018B1CF23D4:-90,4018B1CF23D5:- 83,4018B1CF63D4:-92,D8C7C8138A92: it is MAC address of my wifi access point used for interception. So the app send surrounding wifi networks MAC addresses and signal strength, in plaintext.
30 Sberbank Dynamic analysis reveals all surrondings wifi networks info are sent in plaintext to Yandex servers. Static analysis reveals that it is used for fine indoor geolocation. In fact, Google maps services does it too which is installed on every Android phone. That s basically world wifi networks mapping. Hello Google, someone has stolen my wifi router, can you send me its coordinates please?
31 Bradesco Demo
32 Bradesco Dynamic analysis reveals a private key for accessing bank services is received in plaintext. The embedded Jquery javascript lib contains vulnerabilities.
33 Future work We intend to cover all banking apps throughout the world. Other kind of apps will be analyzed (games, clients, security tools...). Develop out tools further with advanced mathematics (Ph D starting in 2015). Publish the {Egide, Panoptes} reports once security issues will be corrected. Verification analysis will be performed to check whether the users privacy issues have been solved as well.
34 Conclusion Banking apps are far from being totally clean. Beyond a few cases of vulnerabilities, users privacy is not the priority of banks! There is a strong need for pressure on app developpers to take care of users privacy. The bank apps market is not mature and has developped too quickly. Functionalities take precedence over security and users fundamental rights for privacy and data confidentiality. It is very difficult to identify a visible contact point to report security issues.
35 Conclusion All the tested apps are on the Google Play! This means that Google does not perform apps security analysis at all! It does not care about users privacy either (but we all already know that). Google has the power to force developpers to do a better job. Choose open source apps (when available, for banks, well it is utopia). Prefer local/national banks instead of international banks.
36 Many thanks for your attention Questions & Answers Contact:
Are free Android virus scanners any good?
Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)
Symantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo
Symantec's Secret Sauce for Mobile Threat Protection Jon Dreyfus, Ellen Linardi, Matthew Yeo 1 Agenda 1 2 3 4 Threat landscape and Mobile Insight overview What s unique about Mobile Insight Mobile Insight
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
Introduction to Android
Introduction to Android 26 October 2015 Lecture 1 26 October 2015 SE 435: Development in the Android Environment 1 Topics for Today What is Android? Terminology and Technical Terms Ownership, Distribution,
Monitoring mobile communication network, how does it work? How to prevent such thing about that?
Monitoring mobile communication network, how does it work? How to prevent such thing about that? 潘 維 亞 周 明 哲 劉 子 揚 (P78017058) (P48027049) (N96011156) 1 Contents How mobile communications work Why monitoring?
CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP
CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP August 2014 RSA agents recently traced a threat actor advertising a mobile credit card store application. The cybercriminal shared the information
WebView addjavascriptinterface Remote Code Execution 23/09/2013
MWR InfoSecurity Advisory WebView addjavascriptinterface Remote Code Execution 23/09/2013 Package Name Date Affected Versions Google Android Webkit WebView 23/09/2013 All Android applications built with
How we keep harmful apps out of Google Play and keep your Android device safe
How we keep harmful apps out of Google Play and keep your Android device safe February 2016 Bad apps create bad experiences, so we work hard to keep them off your device and out of Google Play. In 2015,
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
Prevent Malware attacks with F5 WebSafe and MobileSafe. Alfredo Vistola Security Solution Architect, EMEA
Prevent Malware attacks with F5 WebSafe and MobileSafe Alfredo Vistola Security Solution Architect, EMEA Malware Threat Landscape Growth and Targets % 25 Of real-world malware is caught by anti-virus Malware
Trend Micro Incorporated Research Paper 2012. Adding Android and Mac OS X Malware to the APT Toolbox
Trend Micro Incorporated Research Paper 2012 Adding Android and Mac OS X Malware to the APT Toolbox Contents Abstract... 1 Introduction... 1 Technical Analysis... 2 Remote Access Trojan Functionality...
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
Securing ios Applications. Dr. Bruce Sams, OPTIMAbit GmbH
Securing ios Applications Dr. Bruce Sams, OPTIMAbit GmbH About Me President of OPTIMAbit GmbH Responsible for > 200 Pentests per Year Ca 50 ios Pentests and code reviews in the last two years. Overview
Legal notices. Legal notices. For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html.
ADOBE AIR Security Legal notices Legal notices For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html. iii Contents Installing and updating desktop applications...........................................................................
(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation
(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation DR. C. NTANTOGIAN 1, DR. C. XENAKIS 1, DR. G. KAROPOULOS 2 1 DEPT. O F DIGITAL SYST EMS,
A Characterization of Malicious Android Applications
A Characterization of Malicious Android Applications Lorenzo Gomez Iulian Neamtiu Department of Computer Science and Engineering University of California, Riverside {gomezl,neamtiu}@cs.ucr.edu June 2011
BYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited [email protected]
Penetration Testing for iphone Applications Part 1
Penetration Testing for iphone Applications Part 1 This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iphone
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
Best Practice Guide (SSL Implementation) for Mobile App Development 最 佳 行 事 指 引. Jointly published by. Publication version 1.
Best Practice Guide (SSL Implementation) for Mobile App Development 流 動 應 用 程 式 (SSL 實 施 ) 最 佳 行 事 指 引 香 港 電 腦 事 故 協 調 中 心 ] Jointly published by [ 專 業 資 訊 保 安 協 會 ] Hong Kong Computer Emergency Response
Project X Mass interception of encrypted connections
Project X Mass interception of encrypted connections What? SSL/TLS interception TOR interception ...a thorny path Common Issues Public Key Pinning avoids rogue CA to sign certs Common Issues Google and
VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert
VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert Contents: 1.0 Introduction p2 1.1 Ok, what is the problem? p2 1.2 Port Forwarding and Edge based Solutions p2 1.3 What is a VPN? p2 1.4
Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications
Reverse Engineering ios Applications Drew Branch, Independent Security Evaluators, Associate Security Analyst ABSTRACT' Mobile applications are a part of nearly everyone s life, and most use multiple mobile
U.S. Cellular Mobile Data Security. User Guide Version 00.01
U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4
IAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner [email protected] IAIK
Motivation 2 Advanced Computer Networks 2015/2016 Johannes Feichtner [email protected] What you have heard last time Mobile devices: Short history, features Technical evolution, major OS,
CRYPTUS DIPLOMA IN IT SECURITY
CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information
Mobile Application Security
Mobile Application Security Jack Mannino Anand Vemuri June 25, 2015 About Us Jack Mannino CEO at nvisium UI and UX development impaired Enjoys: Scala, Elixir Tolerates: Java Allergic To: Cats, Pollen,.NET
The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more
The dramatic growth in mobile device malware continues to escalate at an ever-accelerating pace. These threats continue to become more sophisticated while the barrier to entry remains low. As specific
Threat Model for Mobile Applications Security & Privacy www.datatheorem.com
Overview Mobile applications (and the devices they run on) are powerful, as they can play music, check email, read documents, purchase products, get directions, play games, watch movies, scan barcodes,
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
Connecting your Aiki phone to a network
Connecting your Aiki phone to a network Connect to mobile networks Depending on your carrier and service plan, your phone may connect automatically to your carrier s fastest available data network. Or
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Mobile Security. Luther Knight - @lutherldn Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015.
Mobile Security Luther Knight - @lutherldn Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015 12015 IBM Corporation Where I Started: Blackberry Migration BYOD Bring Your Own
Developing for MSI Android Devices
Android Application Development Enterprise Features October 2013 Developing for MSI Android Devices Majority is the same as developing for any Android device Fully compatible with Android SDK We test using
RV-Droid: Runtime Verification and Enforcement for Android Applications
RV-Droid: Runtime Verification and Enforcement for Android Applications Yliès Falcone, Sebastian Currea, Mohamad Jaber Laboratoire d Informatique de Grenoble - VASCO Team - University of Grenoble, Université
THEODORA TITONIS VERACODE Vice President Mobile
THEODORA TITONIS VERACODE Vice President Mobile MOBILE SECURITY Increasing Threat MOBILE RISK 64% 34% 47% Companies with no BYOD policy. 3 Companies with no app security program. 4 614% Nearly half of
How to Install Applications (APK Files) on Your Android Phone
How to Install Applications (APK Files) on Your Android Phone Overview An Android application is stored in an APK file (i.e., a file named by {Application Name}.apk). You must install the APK on your Android
Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7
Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3
VNC User Guide. Version 5.0. June 2012
VNC User Guide Version 5.0 June 2012 Trademarks VNC is a registered trademark of RealVNC Ltd. in the U.S. and in other countries. Other trademarks are the property of their respective owners. Protected
Transition Networks White Paper. Network Security. Why Authentication Matters YOUR NETWORK. OUR CONNECTION.
Transition Networks White Paper Why Authentication Matters YOUR NETWORK. OUR CONNECTION. : Why Authentication Matters For most organizations physical security is a given. Whether it is video surveillance,
Final Year Project Interim Report
2013 Final Year Project Interim Report FYP12016 AirCrypt The Secure File Sharing Platform for Everyone Supervisors: Dr. L.C.K. Hui Dr. H.Y. Chung Students: Fong Chun Sing (2010170994) Leung Sui Lun (2010580058)
Worldwide attacks on SS7 network
Worldwide attacks on SS7 network P1 Security Hackito Ergo Sum 26 th April 2014 Pierre-Olivier Vauboin ([email protected]) Alexandre De Oliveira ([email protected]) Agenda Overall telecom architecture Architecture
Mobile security, forensics & malware analysis with Santoku Linux. * Copyright 2013 viaforensics, LLC. Proprietary Information.
Mobile security, forensics & malware analysis with Santoku Linux PRESENTER - ANDREW HOOG CEO/Co-founder of viaforensics Andrew is a published author, computer scientist, and mobile security & forensics
CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS
CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich [email protected] Fraunhofer Research Institution
Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security
Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security The IT Security Office (ITSO) What We Do? Risk Assessment Network and System Security Monitoring Vulnerability Scanning
The Incident Response Playbook for Android and ios
SESSION ID: AIR-W03R The Incident Response Playbook for Android and ios Andrew Hoog CEO and Co-founder NowSecure @ahoog42 @NowSecureMobile Andrew Hoog Author of three books Incident Response for Android
Implementing two-factor authentication: Google s experiences. Cem Paya ([email protected]) Information Security Team Google Inc.
Implementing two-factor authentication: Google s experiences Cem Paya ([email protected]) Information Security Team Google Inc. Google services and personalization Identity management at Google 1. Internal
Protecting against Mobile Attacks
2014-APR-17 Protecting against Mobile Attacks Frankie Wong Security Analyst, HKCERT 1 Image source: http://www.techweekeurope.co.uk/news/mobile-malware-record-mcafee-125537 2 Agenda Attacks moving to mobile
Windows Phone 8.1 Mobile Device Management Overview
Windows Phone 8.1 Mobile Device Management Overview Published April 2014 Executive summary Most organizations are aware that they need to secure corporate data and minimize risks if mobile devices are
Enterprise Apps: Bypassing the Gatekeeper
Enterprise Apps: Bypassing the Gatekeeper By Avi Bashan and Ohad Bobrov Executive Summary The Apple App Store is a major part of the ios security paradigm, offering a central distribution process that
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
Mobile App Reputation
Mobile App Reputation A Webroot Security Intelligence Service Timur Kovalev and Darren Niller April 2013 2012 Webroot Inc. All rights reserved. Contents Rise of the Malicious App Machine... 3 Webroot App
Bancassurance Models. Around the World
Bancassurance Models Distribution Channels for Life Insurance: A Global Perspective Around the World 2nd Life Insurance Forum Amsterdam, April 9 th 10 th 2014 Finaccord Ltd., 2014 Web: www.finaccord.com.
How Attackers are Targeting Your Mobile Devices. Wade Williamson
How Attackers are Targeting Your Mobile Devices Wade Williamson Today s Agenda Brief overview of mobile computing today Understanding the risks Analysis of recently discovered malware Protections and best
G DATA MOBILE MALWARE REPORT THREAT REPORT: Q1/2015
G DATA MOBILE MALWARE REPORT THREAT REPORT: Q1/2015 CONTENTS At a glance 03-03 Forecasts and trends 03-03 Current situation: 4,900 new Android malware samples every day 04-04 Half of Android malware is
Harvesting Developer Credentials in Android Apps
8 th ACM Conference on Security and Privacy in Wireless and Mobile Networks, New York City, Jun 24-26 Harvesting Developer Credentials in Android Apps Yajin Zhou, Lei Wu, Zhi Wang, Xuxian Jiang Florida
(In-)Security of Backend-as-a-Service
(In-)Security of Backend-as-a-Service Siegfried Rasthofer (TU Darmstadt / CASED) Steven Arzt (TU Darmstadt / CASED) Robert Hahn (TU Darmstadt) Max Kolhagen (TU Darmstadt) Eric Bodden (Fraunhofer SIT /
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
White Paper. The risks of authenticating with digital certificates exposed
White Paper The risks of authenticating with digital certificates exposed Table of contents Introduction... 2 What is remote access?... 2 Authentication with client side digital certificates... 2 Asymmetric
10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
Android Commercial Spyware Disease and Medication
Android Commercial Spyware Disease and Medication By Eng. Mustafa Saad Computer Engineer 2003 Mobile App Developer 2011 Mobile Security Researcher 2012 Udemy Premium Instructor 2014 March 2016 Agenda Introduction.
ANDROID SECURITY ATTACKS AND DEFENSES ABHISHEK DUBEY I ANMOL MISRA. ( r öc) CRC Press VV J Taylor & Francis Group ^ "^ Boca Raton London New York
ANDROID SECURITY ATTACKS AND DEFENSES ABHISHEK DUBEY I ANMOL MISRA ( r öc) CRC Press VV J Taylor & Francis Group ^ "^ Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an
Privacy Policy Version 1.0, 1 st of May 2016
Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)
How To Protect Your Network From Attack
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Internet (In)Security Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail: [email protected]
Samsung SDS. Enterprise Mobility Management
Samsung SDS Enterprise Mobility Samsung SDS Enterprise Mobility Faster and Safer Samsung SDS Enterprise Mobility provides stronger security for enterprise mobility without Compromising usability of mobile
Security Testing Guidelines for mobile Apps
The OWASP Foundation http://www.owasp.org Security Testing Guidelines for mobile Apps Florian Stahl Johannes Ströher AppSec Research EU 2013 Who we are Florian Stahl Johannes Ströher Lead Consultant for
Zipit Chat. Functional Specification / User Manual
Zipit Chat Functional Specification / User Manual 1 Table of Contents 1. Zipit Chat Overview... 4 How to download... 4 Supported version... 4 2. Functionalities... 4 Get Started... 4 Login... 7 Payment
Tutorial on Smartphone Security
Tutorial on Smartphone Security Wenliang (Kevin) Du Professor [email protected] Smartphone Usage Smartphone Applications Overview» Built-in Protections (ios and Android)» Jailbreaking and Rooting» Security
INSTALLING KAAZING WEBSOCKET GATEWAY - HTML5 EDITION ON AN AMAZON EC2 CLOUD SERVER
INSTALLING KAAZING WEBSOCKET GATEWAY - HTML5 EDITION ON AN AMAZON EC2 CLOUD SERVER A TECHNICAL WHITEPAPER Copyright 2012 Kaazing Corporation. All rights reserved. kaazing.com Executive Overview This document
Acano solution. Security Considerations. August 2015 76-1026-01-E
Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration
HomeConvenience.com. Creating Trust Online CASE STUDY. Comodo Identity and Trust Assurance Suite. Content Verification Certificate.
TM Creating Trust Online CASE STUDY HomeConvenience.com Comodo Identity and Trust Assurance Suite Content Verification Certificate Hacker Guardian SSL Certification Corner of Trust Logo Who are HomeConvenience?
CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE
CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE Due to the encouraging feedback this series of articles has received, we decided to explore yet another type of cyber intrusionthe Man In The Middle (MITM)
CITADEL TROJAN OUTGROWING ITS ZEUS ORIGINS
CITADEL TROJAN OUTGROWING ITS ZEUS ORIGINS May 2012 As of April 30th, 2012 the Citadel Trojan was at its fourth upgrade with Version 1.3.4.0 already in the hands of its customers. Citadel s features, bug
Research on Situation and Key Issues of Smart Mobile Terminal Security
Research on Situation and Key Issues of Smart Mobile Terminal Security Hao-hao Song, Jun-bing Zhang, Lei Lu and Jian Gu Abstract As information technology continues to develop, smart mobile terminal has
INTERMEDIATE ANDROID DEVELOPMENT Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 INTERMEDIATE ANDROID DEVELOPMENT Course Syllabus Course Number: APD-0248 OHLAP Credit: No OCAS Code: None Course Length: 120 Hours Career Cluster:
BUGAT TROJAN JOINS THE MOBILE REVOLUTION
BUGAT TROJAN JOINS THE MOBILE REVOLUTION June 2013 RSA researchers analyzing Bugat Trojan attacks have recently learned that Bugat s developers managed to develop and deploy mobile malware designed to
THE PROXBOOK REPORT THE STATE OF THE PROXIMITY INDUSTRY Q2 2015. All information in this report belongs tounacast AS
THE PROXBOOK REPORT THE STATE OF THE PROXIMITY INDUSTRY Q2 2015. All information in this report belongs tounacast AS TABLE OF CONTENTS Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Page 11 Page
VNC User Guide. Version 5.3. December 2015
VNC User Guide Version 5.3 December 2015 Trademarks RealVNC, VNC and RFB are trademarks of RealVNC Limited and are protected by trademark registrations and/or pending trademark applications in the European
Voice Internet Phone Gateway
Voice Internet Phone Gateway Quick Installation Guide IPC 1000 Series ARTDio Company Inc. Edition 1.0 Note: For more detailed hardware installation instructions, please refer to the IPC 1000 series User
Our journey to a single global brand. Dr. Manfred Stuettgen, Global Head of Branding Lugano, March 11, 2011
Our journey to a single global brand Dr. Manfred Stuettgen, Global Head of Branding Lugano, March 11, 2011 Management Summary Credit Suisse provides financial solutions to private and corporate clients
The Android Developers Guide to 3 rd -Party SDK Assessment and Security
SESSION ID: MBS-F02 The Android Developers Guide to 3 rd -Party SDK Assessment and Security Yang Yang( 杨 德 志 ) Mobile Security Researcher and Developer, Trend Micro Advantages of 3 rd -Party SDKs Speed
IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
