RSS feed Get our RSS feed

News by Topic

BizReport : Mobile Marketing : December 28, 2015

Expert: Mobile security to be focus in 2016

As mobile use continues to expand, security in the mobile space is becoming more important. Here is how one expert believes mobile and security will change in 2016.

by Kristina Knight

iOS security will take center stage

"[Expect] more iOS kernel exploits and jailbreaks for iOS 9.2 and 9.3. We believe a vulnerability similar to Stagefright will emerge on iOS, proving no OS is safe from motivated attackers. We'll also see another Airdrop-esque attack, which will allow hackers to send and install malware on any device within range," said Zuk Avraham, Founder, Chairman & CTO, Zimperium.

Android devices will continue to have late updates

"Despite all of the criticism and pressure Android received this year following our discovery of the Stagefright vulnerability, many Android devices still aren't likely to receive timely updates in 2016. Hackers will continue to target Android and we expect more exploits to take advantage of the shared address space ASLR weakness to gain system privileges. Given the further adoption of SELinux, kernel exploits will also become more important for rooting," said Avraham.

More security breech headlines

"This is due to participation in bug bounty programs, which provide compensation and recognition to hackers who discover and report vulnerabilities in a company's security infrastructure. As companies realize the value of these programs and build the internal acumen to digest the results, more organizations will formalize these programs. Legislative changes will also push researchers toward public disclosure," said Avraham.

Trojans in mobile banking

"We will continue to see banking trojans exploiting vulnerabilities or tricking users into providing their credentials. Trojans gaining elevated permissions by running kernel exploits will become more popular in 2016. The payload of these trojans will likely be accessing the targeted app data folder to copy unencrypted information or to dump the targeted apps' memory (e.g bank or secure IM) in order to gain credentials or other sensitive information," said Avraham.

Image via Shutterstock

Tags: mobile commerce, mobile marketing, mobile trends, Zimperium

Subscribe to BizReport



Copyright © 1999- BizReport. All rights reserved.
Republication or redistribution of BizReport content is expressly prohibited without the prior written consent.
BizReport shall not be liable for any errors in the content, or for any actions taken in reliance thereon.