- Mobile spyware is trivial to write
- Minimal methods of real time eradication or detection of spyware type activities
- Security model of mobile platforms too loose
- No easy/automated way to confirm for ourselves what the applications are actually doing
- We are currently trusting the vendor application store provider for the majority of our mobile device security.
A proof of concept spyware demonstrated how it can be used to dump contacts and messages, intercept text messages, eavesdrop on the room, report on phone usage, and monitor GPS data.
Slides are available here, and the demo is here.
They have also an updated presentation in SOURCE Boston 2010, check it here.
Check the previous post on Smartphone security , and check the smartphone market share by platform.

Check the previous post on Smartphone security , and check the smartphone market share by platform.

No comments:
Post a Comment