Mobile viruses how real is the threat?
http://www.reportsandreports.com/market-reports/mobile-viruses-how-real-is-the-threat/
Introduction
The threat of mobile viruses
malware is not new, but to date, actual attacks on mobile devices have
been few and far between. But with more and more consumers using smart
phones, and banks offering increasingly function-rich services on mobile
devices, the threat is becoming more serious.
Scope
- Retail banks and other financial services providers, as well as technology providers
- This brief provides an analysis of the threat posed to mobile banking and payments by viruses and other malware
- This brief includes recommendations for banks and technology providers on what action should be taken
More and more consumers are using their mobile devices to access banking and payment services. Increasing richness in available functions add to the attraction for the customer and make them ever more appealing targets for criminals.
The volume of actual incidents has been low to date, but industry must act now to ensure the threat doesn't turn into a reality that puts at risk mobile devices as well as back-end systems.
Reasons to Purchase
- This research provides a realistic assessment of today's risk levels, and how these are changing
- This research includes analysis of why the mobile channel requires a different approach to security from the internet channel
- This brief includes recommendations on what companies should do to mitigate the risks arising from mobile malware
SUMMARY 2
Impact 2
Ovum view 2
Key messages 2
MOBILE MALWARE REMAINS A THREAT 4
Attacks remain at the proof of concept stage 4
Few people have experienced serious consequences 4
Mobile devices are vulnerable 5
WHAT ARE THE RISKS? 5
Attacks will focus on financial gain 5
Phones will attract more unwelcome attention as their functions increase 6
The mobile device as the gateway to IT systems 7
Attacks could target devices, networks or back-end systems 8
Each smartphone platform will have a different security profile 8
Spyware 9
Infected hardware distribution 9
Attack evolution timeline 9
A STRATEGY FOR SECURING MOBILE BANKING 10
Living with risk 10
Mobile banking is not an island 11
Defence in depth is required 11
Security won't determine which platform is chosen 12
Security has to be tailored to the platform 12
Mobile transaction security must reflect the medium 13
RECOMMENDATIONS 14
Recommendations for enterprises 14
Recommendations to suppliers 15
APPENDIX 15
Ask the analysts 15
Further reading 16
Methodology 16