The growth of mobility has seen an explosion of messaging applications. Instant messaging has been the “killer app” for smartphones. As messaging providers look to enhance their product offerings beyond sending text and emojis, payments and money transfer are quickly becoming the next area of feature growth.
With crackdowns on privacy breaches, and new security regulations such as GDPR, every organization is walking a minefield when it comes to data protection and mobility. The market needs leading smartphone organizations to continue their push into stronger and more effective security in order to prevent massive privacy infractions or data loss.
The Internet of Things (IOT) sector has seen explosive growth over the last 10 years. The Internet of Things was roughly ‘born’ in 2008/2009, and first added to the Gartner “hype cycle” in 2011. In this time we have seen not only an exponential growth in the number and types of connected devices with over 8 billion connected devices, but also a rise in the risk this presents to organizations and their user’s privacy and security.
One of the critical elements of the Internet economy is the act of validation or authenticating users. Whether it is to log in to your banking, email, social media or other services, you are required to authenticate to the system or device. Fingerprints and facial scanning are just starting to scratch the surface on what can be detected and measured that is unique to you.
2017 was an interesting year for mobile app security, including extensive activity around ransomware, cryptocurrencies and mining apps, rootkits and bootkits, and trojans. Beyond mobile we saw numerous breaches including the likes of Gmail, Docusign, Verizon and Equifax, where Equifax subsequently pulled it’s mobile apps post-breach due to finding previously undiscovered vulnerabilities.
So what will 2018 hold? Let’s take a look at a few trends.
TLS vulnerability returns 19 years later, code-named Return of Bleichenbacher’s Oracle Threat or ROBOT. Researchers have found that countermeasures implemented in many systems are not sufficient and are vulnerable to Bleichenbacher-style attacks.