As the mobile workforce expands and the amount of data available on the go increases, businesses beware: if youâ€™re not making mobile security a top priority, it could come back to haunt you. The recently issued Nokia Threat Intelligence Report showed that the rate of mobile device infections rose steadily throughout 2016, peaking in October at an all-time high and increasing 63% from July through December over the first half of the year!
As smartphones increasingly become the primary computing device for many users, they also present a greater risk for certain cyber attacks. According to aÂ recent report from ESET, ransomware attacks on Android devices rose more than 50% in the past year.
At Tech Orchard, weâ€™ve spoken with clients and written about the importance of taking precautionary security measures to protect mobile devices. For most users, the first step is setting a password to lock their smartphone or tablet. PINs and thumbprints are options available on devices from various manufacturers, while pattern lock is widely used as a mechanism for authentication and authorization on Android devices. Unfortunately for pattern lock users, this security method may be anything but secure.
After thorough research performed by our mobile threat prevention (MTP) partner, Check Point, a new and alarming type of malware campaign has been identified. Known as Gooligan, this malware is used to generate ad revenue on the Android platform. Check Point noted that as of the end of November, Gooligan had breached the security of more than one million Google accounts, with an additional 13,000 devices being impacted each day.
From data mining and machine learning to VR (virtual reality) and AI (artificial intelligence), the tech industry is no stranger to its fair share of buzzwords. One that has dominated headlines throughout 2016 is IoT, or the Internet of Things. To put it simply, the IoT refers to the flourishing ecosystem of devices connected to the Internet that can generate, consume and exchange data via embedded sensors. Mobile devices, our focus here at Tech Orchard, are a critical part of this ecosystem.
Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its Threat Horizon report. The document provides a two-year, forward-looking projection of the biggest security threats we can expect to face. Earlier this year, the report detailed the top nine threats to watch for from 2016 to 2018. Letâ€™s take a moment to remind ourselves of these threats and how to address them.