As smartphones increasingly become the primary computing device for many users, they also present a greater risk for certain cyber attacks. According to aÂ recent report from ESET, ransomware attacks on Android devices rose more than 50% in the past year.
At Tech Orchard, weâ€™ve spoken with clients and written about the importance of taking precautionary security measures to protect mobile devices. For most users, the first step is setting a password to lock their smartphone or tablet. PINs and thumbprints are options available on devices from various manufacturers, while pattern lock is widely used as a mechanism for authentication and authorization on Android devices. Unfortunately for pattern lock users, this security method may be anything but secure.
After thorough research performed by our mobile threat prevention (MTP) partner, Check Point, a new and alarming type of malware campaign has been identified. Known as Gooligan, this malware is used to generate ad revenue on the Android platform. Check Point noted that as of the end of November, Gooligan had breached the security of more than one million Google accounts, with an additional 13,000 devices being impacted each day.
From data mining and machine learning to VR (virtual reality) and AI (artificial intelligence), the tech industry is no stranger to its fair share of buzzwords. One that has dominated headlines throughout 2016 is IoT, or the Internet of Things. To put it simply, the IoT refers to the flourishing ecosystem of devices connected to the Internet that can generate, consume and exchange data via embedded sensors. Mobile devices, our focus here at Tech Orchard, are a critical part of this ecosystem.
Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its Threat Horizon report. The document provides a two-year, forward-looking projection of the biggest security threats we can expect to face. Earlier this year, the report detailed the top nine threats to watch for from 2016 to 2018. Letâ€™s take a moment to remind ourselves of these threats and how to address them.
Whether youâ€™re an avid â€śFrom the Orchardâ€ť reader or simply view our blog from time to time, itâ€™s likely youâ€™ve noticed that we do our best to keep you out in front of major security threats and aware of ways to help combat them in your organization. While itâ€™s probably no surprise that corporate-provided and BYOD (bring your own device) mobile assets pose a substantial risk to your company data, itâ€™s important to understand that a balance between technology solutions and human solutions is the best way to protect your organization from harm.