The Silk Road: The Rise and Fall of the World's Largest Online Black Market
vdutta1980at February 01,2016 Wow! this just made me realize how important personal data are on any info-system. As someone who has been working in the industry for a couple of years, this is just the tip of the iceberg when it comes for malware intrusions. The scope has expanded and cybersecurity teams are now looking at ways to infect mobile devices at the kernel level and also at the machine code/opcode level. I am curious to learn where the mobile malware market will end up.
adamat February 16,2016 To further vdutta1980's point I would argue that in the next few years it will be the most highly targeted device for hackers. A phone contains almost every personal piece of information about a person. That information can be exploited by advertisers, hackers, and the company that makes the phone/phone os. It may be time to start teaching kids in middle school./high school about computer security as a fundamental part of basic education.
BrianDaugetteat February 24,2016 It's amazing to me how quickly cybercriminals are able to adapt to new technology and begin exploiting it for profit. Their ability to target mobile devices is particularly scary because they go with us EVERYWHERE and have so much important data on them. As people rely on them more and more to conduct their business, hackers ability and desire to exploit them is only going to grow. With the coming age of ubiquitous computing and the Internet of things, how long until we start connecting our smartphones to all our electronic devices? And how long until the hacker try to find a way to exploit that? I can imagine a scenario in the future where a hacker gets access to your mobile device and uses it to connect to devices in your house that are a part of the Internet of things. They then threaten to brick your new 90 inch flatscreen TV, or your fridge unless you pay them a ransom.
tcmahonyat March 16,2016 I liken the scenario presented in this video to the typical phishing scenario except in this case it was with a mobile phone and SMS as opposed to email. Mobile devices present another attack vector using similar tactics with slight variations due to the mobile technology. This video also shows how our smartphones and tablets are really computers and the security of these devices need to be handled just the same if not better. What was not even addressed was the wireless attack vectors that mobile devices present. Bluetooth and 802.11 present vectors that could be exploited by someone in close proximity. It would have been beneficial for Trend Micro to point out some methods users could use in securing their mobile devices like AV or an app that can help prevent malicious actions. User training can only go so far in terms of prevention.
CCotton10at April 01,2016 The video makes you stop and think about what you are doing on you phone. In the past six months, I have worked for two different employers. Each had very different policies concerning where phones could be during the workday. The first employer required that the phone be locked outside the workspace. This would have eliminated the threat of the microphone issue. It seemed excessive at the time.
Paying attention to what apps are being downloaded and from where seems to be very important.