The rising trend in phishing attacks across email and websites is spilling over to mobile applications. Learn about the attack vectors and how to mitigate.
Mobile World Congress Americas (MWCA) 2017 just took place, with a plethora of current mobile products and solutions, and some tantalizing glimpses of future. The projections are for growth, growth, and more growth, either by equipping the mobile-less minority with mobile devices, or getting existing users to do even more with their mobiles, from controlling their toasters to managing networks of connected sensors.
As an attendee you would expect that a premier event such as MWC would take the appropriate measures to protect both itself and you, but they haven't. After leveraging our platform to rapidly analyze the MWC application we found multiple vulnerabilities that could put attendees at significant risk. What's worse is that one of the vulnerabilities has been around since 2012 and has been documented in at least nine different books (yes, nine) on mobile security and hacking mobile devices.
Check out each of these two mobile operating systems together with the keywords “security” and then “privacy” in your favorite search engine. It soon becomes clear how popular opinion stacks up for one versus the other. Yet recent results of tests of the top 100 apps for iOS and for Android could be a real eye-opener for many.
In the last few years it’s become nearly impossible for organizations to appropriately staff cybersecurity positions. According to Forbes, the market is looking at a global shortage of 2 million cybersecurity professionals by 2019, and that gap only looks to be increasing. One area where this is heavily felt is the 68% of companies that are increasing spending on mobile development, but have difficulty in filling the positions necessary to release safe and secure applications.
On August 10th Ken Lloyd, Chief Technical Officer and Co-Founder of Mi3 Security and board member for CMDSP (Credentialed Mobile Device Security Professionals) will explain the leading Enterprise Mobility Credential, CMDSP and discuss the latest mobile security technologies that impact the IT Mobile Administrator.