Malware writers are also likely to use social

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ght lack attention to messages displayed on the device. Malware writers are also likely to use social-engineering techniques to get their software installed on devices. Platforms that install software without user involvement are obviously even more open to malware. Industry must learn to live with the threat to and from mobile devices Doing nothing is not an option. By this we don’t just mean doing nothing about the threat – there are also companies that believe the best way to counter mobile security issues is by simply not providing mobile access and services for their customers and prospects. We believe that this is misguided from two key perspectives: first, consumers increasingly expect and demand mobile applications (whether via a mobile site or an app on the device) to be available, and second, there are other ways in which mobile devices could be compromised (for example, with the installation of spyware), allowing criminals to capture confidential information that could in turn be used to gain illegal access to systems or to commit fraud. The industry must do all it can to maintain the integrity of the mobile ecosystem, and should seek to learn from the Internet pioneers to avoid repeating their mistakes, but it is 26 S TRAIGHTTALK I T THE INDUSTRY MUST DO ALL IT CAN TO MAINTAIN THE INTEGRITY OF THE MOBILE ECOSYSTEM, AND SHOULD SEEK TO LEARN FROM THE INTERNET PIONEERS TO AVOID REPEATING THEIR MISTAKES inconceivable that they will eradicate all malware. As the mobile ecosystem becomes more diverse, more powerful and complex, and more integrated with the IP world, hackers will find ways to attack it and perpetrate fraud, and these attacks will increase in line with increased use of the mobile channel for interactive and transactional services. As one of the twentieth century’s most prolific bank robbers reportedly said: “Go where the money is…go there often”. Addressing the threat requires a strategy of “defense in depth” One of the key lessons from the Internet era has been “always be prepared”. Attacks may occur at the mobile device, in the mobile networ...
View Full Document

This document was uploaded on 12/31/2013.

Ask a homework question - tutors are online