Welcome!

News Feed Item

'Cybercriminals Flood Mobile Platforms With Malware and Take Advantage of Poor Security to Cash in on a Vulnerable Smartphone Market' Says Latest Visiongain Report.

LONDON, August 16, 2011 /PRNewswire/ --

http://www.visiongain.com/report/665/mobile-device-security-2011-2016-op...

Visiongain's new management report "Mobile Device Security 2011-2016" examines rapidly growing threats targeting mobile devices such as data and ID theft, SMS fraud, rogue apps and covert espionage. Visiongain research shows that the number of mobile malware more than doubled in 2011 from 2010. Popular PC-related viruses, such as the ZeuS phishing Trojan which steals banking information, have now infected mobile operating systems. Malicious software targeting mobiles is well developed and is already capable of stealing data, corrupting functions and usurping control.

Cybercriminals are actively exploiting the popularity of smartphones and tablets. Low user awareness of the risks, and lax security enforcement within organisations are enabling easy opportunities for illegitimate monetisation. The recent high-profile exposure of Android malware has prompted the rise of a lucrative market for security software and services for mobile devices.

This potentially huge market has many dynamics of monetization, user and enterprise habits, fierce competition and IT trends dictating its development. Visiongain expects the mobile security market to reach $3.95 billion in global revenues by 2016. Mobile Device Security 2011 - 2016 investigates the latest mobile threats and examines the most efficient protection mechanisms. The report provides a detailed breakdown of all these facets, including market forecasts for growth and detailed analysis of development prospects for the period 2011-2016.

Operators and vendors working in mobile markets will learn essential information concerning mobile risks and solutions, key players in the mobile security market, their strategies and business models. The report contains exclusive interviews with leading security experts from McAfee, AVG, Panda Security, Lookout, SmrtGuard, Mobile Security Labs, BullGuard, Telefónica and Vodafone.

Mobile threats are a growing menace and will become as prevalent and as dangerous as for PCs. Visiongain's report will help readers to understand the risks, safeguard against attacks and protect their devices and data accordingly, be it for SMBs, large organisations, software vendors, handset manufacturers, service providers or mobile network operators.

http://www.visiongain.com

        
        Table of content:
        Executive Summary
        E.1 The Mobile Revolution
        E.2 A New Ecosystem Breeds New Threats
        E.3 Countering Mobile Threats
        E.4 A Growing Mobile Security Market
        E.5 Findings of the Report

        Chapter 1: The Changing Security Landscape
        1.1 A Technological Evolution
        1.2 The Growth of Mobile Devices
        1.3 The Rise of the Mobile Worker
        1.4 Paradigm Shift in Enterprise
        1.5 The Advance of Mobile Malware
        1.6 Adapting Security to a New Environment
        1.7 The Aim & Scope of the Report
        1.8 Questions Answered by the Report
        1.9 Structure of the Report
        1.10 Methodology

        Chapter 2: Security Concerns in the Mobile Ecosystem
        2.1 The Cost of Data Breach
        2.2 Unauthorised Access and Collection of Data
        2.2.1 Targeting Location Based Data
        2.2.2 Access through Web Apps
        2.3 Poor End-User Awareness
        2.4 Enterprise Trends in Mobile Security
        2.5 The Digital Black Market
        2.6 Cybercrime Targeting Finance Intensive Industries
        2.6.1 Financial Institutions
        2.6.2 Industrial & Political Espionage
        2.6.3 Mobile Payments
        2.6.3.1 SMS/USSD Based Transactional Payments
        2.6.3.2 Direct Mobile Billing
        2.6.3.3 WAP Payments
        2.6.3.4 Contactless NFC
        2.6.3.5 Securing Mobile Payments
        2.7 Are Convergence & Interoperability Risk Factors?
        2.8 Open-Source: A Double Edged Sword?
        2.9 Current Awareness: The UK Phone Hacking Scandal

        Chapter 3: Mobile Malware: A threat to Mainstream Industries
        3.1 Mobile Malware Evolution
        3.1.1 Trojans
        3.1.2 Worms
        3.1.3 Spyware
        3.1.4 Spam
        3.2 The Mobile Threat Expansion by Platform
        3.2.1 Android
        3.2.2 Symbian
        3.2.3 iOS
        3.2.4 BlackBerry
        3.2.5 Windows Mobile
        3.3 What are the Malware Vectors for Mobile?
        3.3.1 SMS & MMS
        3.3.2 Wi-Fi & Bluetooth
        3.3.3 Apps & Downloads
        3.3.4 SD & Multimedia Cards
        3.4 Digital Fraud through Social Engineering

        Chapter 4: An Emerging Market for Mobile Security Services
        4.1 Limiting the Spread of Mobile Malware
        4.1.1 Device Security
        4.1.2 Data Security
        4.1.3 Network Security
        4.2 Encryption & Certificates
        4.2.1 Code Signing Certificates
        4.2.2 Two-Factor Authentication
        4.3 Anti-Virus Software
        4.4 Firewalls & Filtering
        4.5 Mobile VPN
        4.6 Mobile Device Management
        4.7 Identity Management
        4.8 Biometrics
        4.9 Drivers for a Specialised Mobile Security Market
        4.9.1 Enterprise Security
        4.9.2 Protecting Data & User ID
        4.10 Mobile Security Markets Forecast
        4.10.1 Asian, Latin American, African & Middle Eastern Markets
        4.10.2 Developed Markets
        4.10.3 Mobile Security Software Market by Users
        4.11 Mobile Client Software Market
        4.12 Mobile Device Management in Enterprise
        4.13 Security as a Service
        4.14 Global Network Security Market

        Chapter 5: Shaping the Mobile Security Landscape
        5.1 How are OEMs & OTT Providers Addressing Mobile Security Issues?
        5.1.1 RIM BlackBerry OS
        5.1.1.1 BlackBerry Enterprise Solution
        5.1.1.2 BlackBerry Mobile Data System Services
        5.1.1.3 BlackBerry Internet Service
        5.1.2 Microsoft Windows Phone
        5.1.2.1 Sandbox
        5.1.2.2 Application Deployment
        5.1.2.3 Application Development
        5.1.2.4 Microsoft Exchange ActiveSync (EAS) Security-Related Policies
        5.1.2.5 Data Protection Considerations
        5.1.2.6 Nokia
        5.1.3 Apple iOS
        5.1.4 Hewlett Packard (HP) WebOS
        5.1.5 Google Android
        5.1.6 Analysis of Mobile OS Based on Security Features
        5.2 The Role of Network Operators
        5.2.1 Telefónica
        5.2.1.1 Expert Opinion
        5.2.2 Vodafone
        5.2.3 Orange
        5.3 Security Software Specialists
        5.3.1 Symantec
        5.3.2 Trend Micro
        5.3.3 McAfee
        5.3.3.1 Expert Opinion
        5.3.4 Kaspersky Labs
        5.3.5 AVG Expert Opinion
        5.3.5
        .1 Mobile Threats
        5.3.5.2 The Evolution of Mobile Malware
        5.3.5.3 How Dangerous is the Open-Source Model?
        5.3.5.4 Future Developments in Mobile Malware
        5.3.5.5 AVG Product Overview
        5.3.6 Sophos
        5.3.7 Panda Security Expert Opinion
        5.3.7.1 Mobile Threats
        5.3.7.2 The Evolution of Mobile Malware
        5.3.7.3 How Dangerous is the Open-Source Model?
        5.3.7.4 Future Developments in Mobile Malware
        5.3.7.5 Panda Security Product Overview
        5.3.8 BullGuard Expert Opinion
        5.3.8.1 Mobile Threats
        5.3.8.2 The Evolution of Mobile Malware
        5.3.8.3 How Dangerous is the Open-Source Model?
        5.3.8.4 Future Developments in Mobile Malware
        5.3.8.5 BullGuard Product Overview
        5.3.9 F-Secure
        5.3.10 Other Vendors
        5.4 Mobile Security Specialists
        5.4.1 SmrtGuard
        5.4.1.1 Expert Opinion
        5.4.2 Lookout
        5.4.2.1 Expert Opinion
        5.4.3 Mobile Security Labs
        5.4.3.1 Mobile Threats
        5.4.3.2 The Evolution of Mobile Malware
        5.4.3.3 How Dangerous is the Open-Source Model?
        5.4.3.4 Future Developments in Mobile Malware
        5.4.4 MobileIron
        5.4.5 DeviceLock
        5.4.6 UMU
        5.4.7 MobiDM
        5.4.8 DataViz
        5.4.9 Mformation
        5.4.10 InnoPath
        5.4.11 Sybase
        5.5 Analysis of Mobile Security Vendors
        5.6 Analysis of Mobile Security Market
        5.7 The Market for Mobile MDM Vendors

        Chapter 6: Conclusion
        6.1 Emerging Specialised Markets
        6.2 Mitigating Mobile Security Risks
        6.3 Deploying Mobile Security Solutions
        6.4 Educating End-Users
        6.5 Enterprise Policy & Device Management
        6.6 Anticipating Future Threats
        6.7 Recommendations for Businesses
        6.8 Key Findings of the Report

        Appendix A
        About visiongain

        Appendix B
        Visiongain Report Evaluation Form

Notes for Editors

If you are interested in a more detailed overview of this report, please send an e-mail to [email protected] or call her on +44 (0) 207 336 6100

About visiongain

Visiongain is one of the fastest growing and most innovative independent media companies in Europe. Based in London, UK, visiongain produces a host of business-2-business conferences, newsletters, management reports and e-zines focusing on the Telecoms, Energy, Pharmaceutical, Defence, Materials sectors.

Visiongain publishes reports produced by its in-house analysts, who are qualified experts in their field. Visiongain has firmly established itself as the first port-of-call for the business professional, who needs independent, high quality, original material to rely and depend on.

        
        For further information on this report click on:
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        eport/665/mobile-device-security-2011-2016-opportunities-and-challenges
        For an exec summary please contact:
        Sara Peerun
        [email protected]
        Tel: +44-(0)20-7336-6100

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
SYS-CON Events announced today that TidalScale will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. TidalScale is the leading provider of Software-Defined Servers that bring flexibility to modern data centers by right-sizing servers on the fly to fit any data set or workload. TidalScale’s award-winning inverse hypervisor technology combines multiple commodity servers (including their ass...
In the fast-paced advances and popularity in cloud technology, one of the most critical factors revolves around concerns for security of your critical data. How to assure both your company and your customers they can confidently trust and utilize your cloud environment is most often top on the list. There is a method to evaluating and providing security that exceeds conventional modes of protecting data both within the cloud as well externally on mobile and other devices. With the public failure...
Join IBM November 1 at 21st Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA, and learn how IBM Watson can bring cognitive services and AI to intelligent, unmanned systems. Cognitive analysis impacts today’s systems with unparalleled ability that were previously available only to manned, back-end operations. Thanks to cloud processing, IBM Watson can bring cognitive services and AI to intelligent, unmanned systems. Imagine a robot vacuum that becomes your personal assistant tha...
Widespread fragmentation is stalling the growth of the IIoT and making it difficult for partners to work together. The number of software platforms, apps, hardware and connectivity standards is creating paralysis among businesses that are afraid of being locked into a solution. EdgeX Foundry is unifying the community around a common IoT edge framework and an ecosystem of interoperable components.
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, will provide a fun and simple way to introduce Machine Leaning to anyone and everyone. Together we will solve a machine learning problem and find an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intellige...
Gemini is Yahoo’s native and search advertising platform. To ensure the quality of a complex distributed system that spans multiple products and components and across various desktop websites and mobile app and web experiences – both Yahoo owned and operated and third-party syndication (supply), with complex interaction with more than a billion users and numerous advertisers globally (demand) – it becomes imperative to automate a set of end-to-end tests 24x7 to detect bugs and regression. In th...
As popularity of the smart home is growing and continues to go mainstream, technological factors play a greater role. The IoT protocol houses the interoperability battery consumption, security, and configuration of a smart home device, and it can be difficult for companies to choose the right kind for their product. For both DIY and professionally installed smart homes, developers need to consider each of these elements for their product to be successful in the market and current smart homes.
Infoblox delivers Actionable Network Intelligence to enterprise, government, and service provider customers around the world. They are the industry leader in DNS, DHCP, and IP address management, the category known as DDI. We empower thousands of organizations to control and secure their networks from the core-enabling them to increase efficiency and visibility, improve customer service, and meet compliance requirements.
In his session at 21st Cloud Expo, Michael Burley, a Senior Business Development Executive in IT Services at NetApp, will describe how NetApp designed a three-year program of work to migrate 25PB of a major telco's enterprise data to a new STaaS platform, and then secured a long-term contract to manage and operate the platform. This significant program blended the best of NetApp’s solutions and services capabilities to enable this telco’s successful adoption of private cloud storage and launchi...
The session is centered around the tracing of systems on cloud using technologies like ebpf. The goal is to talk about what this technology is all about and what purpose it serves. In his session at 21st Cloud Expo, Shashank Jain, Development Architect at SAP, will touch upon concepts of observability in the cloud and also some of the challenges we have. Generally most cloud-based monitoring tools capture details at a very granular level. To troubleshoot problems this might not be good enough.
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm. In their Day 3 Keynote at 20th Cloud Expo, Chris Brown, a Solutions Marketing Manager at Nutanix, and Mark Lav...
With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend 21st Cloud Expo October 31 - November 2, 2017, at the Santa Clara Convention Center, CA, and June 12-14, 2018, at the Javits Center in New York City, NY, and learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.
Cloud Expo, Inc. has announced today that Andi Mann and Aruna Ravichandran have been named Co-Chairs of @DevOpsSummit at Cloud Expo Silicon Valley which will take place Oct. 31-Nov. 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. "DevOps is at the intersection of technology and business-optimizing tools, organizations and processes to bring measurable improvements in productivity and profitability," said Aruna Ravichandran, vice president, DevOps product and solutions marketing...
SYS-CON Events announced today that mruby Forum will exhibit at the Japan External Trade Organization (JETRO) Pavilion at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. mruby is the lightweight implementation of the Ruby language. We introduce mruby and the mruby IoT framework that enhances development productivity. For more information, visit http://forum.mruby.org/.
The dynamic nature of the cloud means that change is a constant when it comes to modern cloud-based infrastructure. Delivering modern applications to end users, therefore, is a constantly shifting challenge. Delivery automation helps IT Ops teams ensure that apps are providing an optimal end user experience over hybrid-cloud and multi-cloud environments, no matter what the current state of the infrastructure is. To employ a delivery automation strategy that reflects your business rules, making r...