Mobile World Congress Americas (MWCA) 2017 just took place, with a plethora of current mobile products and solutions, and some tantalizing glimpses of future. The projections are for growth, growth, and more growth, either by equipping the mobile-less minority with mobile devices, or getting existing users to do even more with their mobiles, from controlling their toasters to managing networks of connected sensors.
As an attendee you would expect that a premier event such as MWC would take the appropriate measures to protect both itself and you, but they haven't. After leveraging our platform to rapidly analyze the MWC application we found multiple vulnerabilities that could put attendees at significant risk. What's worse is that one of the vulnerabilities has been around since 2012 and has been documented in at least nine different books (yes, nine) on mobile security and hacking mobile devices.
Check out each of these two mobile operating systems together with the keywords “security” and then “privacy” in your favorite search engine. It soon becomes clear how popular opinion stacks up for one versus the other. Yet recent results of tests of the top 100 apps for iOS and for Android could be a real eye-opener for many.
In the last few years it’s become nearly impossible for organizations to appropriately staff cybersecurity positions. According to Forbes, the market is looking at a global shortage of 2 million cybersecurity professionals by 2019, and that gap only looks to be increasing. One area where this is heavily felt is the 68% of companies that are increasing spending on mobile development, but have difficulty in filling the positions necessary to release safe and secure applications.
On August 10th Ken Lloyd, Chief Technical Officer and Co-Founder of Mi3 Security and board member for CMDSP (Credentialed Mobile Device Security Professionals) will explain the leading Enterprise Mobility Credential, CMDSP and discuss the latest mobile security technologies that impact the IT Mobile Administrator.
The new generation of conversational assistants or chatbots for mobiles come the closest ever to making your Android or iOS device seem like a human companion. So, you could be forgiven for trying to appeal to a machine’s sense of ethics, if it looks like a chatbot was responsible for your mobile bank account being emptied or your personal data stolen.
Unfortunately for attendees of the BlackHat and DefCon 2017 conferences on IT and cyber security, this could become all too true. Unlike others on wild sprees in the gambling capital of America who would dearly like to leave all the evidence behind them, these conference attendees could be leaving valuable personal or company data, if the super-hackers have their way.