The Six Most Common Threats Against The Device That Knows You Best - PowerPoint PPT Presentation

About This Presentation
Title:

The Six Most Common Threats Against The Device That Knows You Best

Description:

Aside from your partner, children, or parents, what is the most intimate relationship in your life? It's our cell phone for many of us. It's the last thing we see before going to bed, and it's usually the first thing we pick up in the morning. Therefore, the platform that is constantly connected, always-on, and almost always within inches of our bodies must be protected. – PowerPoint PPT presentation

Number of Views:1
Slides: 11
Provided by: infosectrain08
Tags:

less

Transcript and Presenter's Notes

Title: The Six Most Common Threats Against The Device That Knows You Best


1
The Six Most Common Threats Against The Device
That Knows You Best
www.infosectrain.com sales_at_infosectrain.com
2
Aside from your partner, children, or parents,
what is the most intimate relationship in your
life? It's our cell phone for many of us. It's
the last thing we see before going to bed, and
it's usually the first thing we pick up in the
morning. Therefore, the platform that is
constantly connected, always-on, and almost
always within inches of our bodies must be
protected.
www.infosectrain.com sales_at_infosectrain.com
3
  • Let's look at the six threats that we see most
    frequently in the mobile landscape
  • Malicious Apps
  • While the number of malicious apps targeting
    mobile devices is lower than desktops, these apps
    are common, particularly those targeting the
    Android platform. The number of malicious apps
    detected in Android endpoint protection has
    steadily increased over the last year. The
    malicious app seen includes words like Chrome,
    voicemail, and video player.
  • Phishing
  • Mobile phishing attacks, also known as smishing,
    do not only target a device via SMS. They can
    also be directed at other popular messaging apps,
    such as WhatsApp or Facebook Messenger. These
    attacks, posing as technical support, solicit
    credentials over the phone or trick users into
    installing remote access tools on a mobile device
    or a computer. On the mobile phone, we also see
    vishing (voice phishing).
  • Calendar Spam
  • ICS or iCalendar files, which are used to
    schedule events and meetings on Apple devices,
    are used by spammers to target iOS devices. These
    files can also be used to sign up for calendar
    subscriptions. When you click on an event in one
    of these spam calendars, you may be taken to a
    page with malicious links or scams. Users will be
    invited to calendars that are filled with spam,
    effectively rendering the calendar useless.


www.infosectrain.com sales_at_infosectrain.com
4
  • Overlays
  • Overlays feature allows apps to be stacked on top
    of each other. This strategy isn't for the faint
    of heart. Consider a banking app with a malicious
    app overlaid on it, but only in the credential
    area. As far as the user is concerned, the
    credentials entered appear to be sent to the
    banking application. They are, however, heading
    straight for the perpetrator. 
  • Spyware
  • Zero-click exploits of vulnerabilities can infect
    a device via a phone call or a text message. That
    is all it takes for the exploit to enter the
    system, execute the payload, and install spyware.
    Other exploitations require only a single click.
    The payload is executed as soon as a message is
    opened.
  • Stalkerware
  • Stalkerware is another threat that looks and acts
    like spyware but poses a far greater threat to
    the average user. These apps have features such
    as pinpointing a device's exact location, reading
    SMS messages, taking photos or videos, and
    recording conversations.
  • How Can InfosecTrain Help You?
  • When it comes to the security issues in any
    organizations IT system that must be
    identified, InfosecTrain understands the
    importance of professional training to help you
    combat these attacks and threats. Visit our
    website for State-of-the-art training programs in
    Information Security and Cyber Security to jack
    up your security acumen both personally and
    professionally!





www.infosectrain.com sales_at_infosectrain.com
5
About InfosecTrain
  • Established in 2016, we are one of the finest
    Security and Technology Training and Consulting
    company
  • Wide range of professional training programs,
    certifications consulting services in the IT
    and Cyber Security domain
  • High-quality technical services, certifications
    or customized training programs curated with
    professionals of over 15 years of combined
    experience in the domain

www.infosectrain.com sales_at_infosectrain.com
6
Our Endorsements
www.infosectrain.com sales_at_infosectrain.com
7
Why InfosecTrain
Global Learning Partners
Access to the recorded sessions
Certified and Experienced Instructors
Flexible modes of Training
Tailor Made Training
Post training completion
www.infosectrain.com sales_at_infosectrain.com
8
Our Trusted Clients
www.infosectrain.com sales_at_infosectrain.com
9
(No Transcript)
10
Contact us
Get your workforce reskilled by our certified and
experienced instructors!
IND 1800-843-7890 (Toll Free) / US 1
657-722-11127 / UK 44 7451 208413
sales_at_infosectrain.com
www.infosectrain.com
Write a Comment
User Comments (0)
About PowerShow.com