Surviving the Mobile Phenomenon: Identify At-Risk Mobile Devices Before It’s Too Late

October 22, 2015 from 03:00 PM – 04:00 PM UTC
|

Today’s consumers have a wide variety of smartphones and tablets, several operating system choices, and an abundance of security risks to manage. This ever-growing number of options greatly increases the likelihood of end users installing a suspicious app, downloading and installing malware (in a drive-by download for example), or simply being attacked by a social engineering campaign. Cybercriminals have advanced their attack methods on the mobile device; from bypassing the mobile device ID and cross-channel attacks leveraging the one-time password (OTP), to mobile phishing and malware targeting the mobile platform. The mobile threat landscape has progressed significantly in threat techniques targeting both devices and end users. Techniques such as cross-channel attacks, Short Message Service (SMS) forwarding, malware, and phishing are prevalent in the mobile channel because of inherent flaws in the mobile device’s operating system and human error.

View on demand

Join IBM Mobile Security experts as they:

  • Discuss the current state of the mobile security market and threats facing the enterprise
  • Share the 4 key imperatives that must be a part of a holistic mobile security strategy
  • Take a deep dive into the key imperative: “Managing Access & Fraud”

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today