Mobile Security Forum

Total Page:16

File Type:pdf, Size:1020Kb

Mobile Security Forum 1 FEDERAL TRADE COMMISSION 2 3 4 5 6 7 MOBILE SECURITY FORUM 8 POTENTIAL THREATS AND SOLUTIONS 9 10 11 JUNE 4, 2013 12 13 14 15 16 17 Federal Trade Commission 18 601 New Jersey Avenue, N.W., Conference Center 19 Washington, DC 20 21 22 23 24 25 2 Final Version Mobile Security Forum 6/4/2013 1 FEDERAL TRADE COMMISSION 2 I N D E X 3 4 Session Page 5 6 Welcome, Emily Cope Burton 3 7 8 Opening Remarks, Chairwoman Edith Ramirez 6 9 10 Overview, Steven M. Bellovin 12 11 12 Panel 1: Understanding Mobile Malware 20 13 14 Panel 2: Building Security into Modern 15 Mobile Platforms 78 16 17 Speaker, Markus Jakobsson 145 18 19 Panel 3: Extending Security Throughout the 20 Mobile Ecosystem 160 21 22 Panel 4: Solutions for Consumers to Protect 23 Themselves from Mobile Threats 225 24 25 Closing Remarks, Charles A. Harwood 290 For The Record, Inc. (301) 870-8025 - www.ftrinc.net - (800) 921-5555 3 Final Version Mobile Security Forum 6/4/2013 1 WELCOME 2 MS. BURTON: Good morning, everyone. I’m Emily 3 Cope Burton from the Division of Marketing Practices of 4 the Federal Trade Commission, and it is my pleasure to 5 welcome you to our Mobile Security Forum. I’m delighted 6 that you’re all here to learn with us and teach us as 7 well. Since this is a post-sequester-era government 8 event, there is no coffee or water. I just want to warn 9 you in advance. You will have full access to the 10 bathrooms, which are across the lobby to the left of the 11 security desk. There is also a water fountain there if 12 you brought your own container. We have a 20-minute 13 break after the first panel, though, so those of who you 14 did not come prepared will have time to get some 15 provisions. 16 A few notes about the Q&A. We will not have 17 specific Q&A sessions or Q&A portions of panels, so if 18 you have a question, you can write it down on a Q&A card. 19 There are a couple in each of the folders, and there are 20 also some out on the table with the materials. Hold it 21 up in the air, someone will come and get it and deliver 22 it to the moderator, and we’ll try to ask -- get through 23 as many of those questions as we can. But we will be 24 taking only written questions. 25 We will also, because we are very high-tech For The Record, Inc. (301) 870-8025 - www.ftrinc.net - (800) 921-5555 4 Final Version Mobile Security Forum 6/4/2013 1 here at the FTC, be taking questions over our Facebook 2 page, in the Workshop Status thread, and via email to 3 OPA, for Office of Public Affairs, @ftc.gov. And then 4 also the FTC staff will be live-tweeting this event from 5 the FTC Twitter account and using #ftcmobile. So, 6 speaking of mobile, please take this opportunity to turn 7 off your mobile devices. 8 And then let me just quickly run through our 9 security procedures. Anyone who leaves the building 10 without an FTC badge will require -- be required to go 11 back through security, including the metal detectors, 12 prior to reentry. So, if you’re leaving for a break or 13 lunch, please time your return accordingly. 14 In the event of a fire or evacuation of the 15 building, please leave the building in an orderly 16 fashion. Once aside, look directly across New Jersey 17 Avenue to the Georgetown Law Center, which is our 18 rallying point. On the front sidewalk to the right side 19 of the building is where you’ll meet, and there will be a 20 person accounting for all of the conference center 21 attendees. 22 In the event that it’s safer to remain inside 23 the building, you’ll be told where to go inside the 24 building. If you spot suspicious activity, please report 25 it to security. And this event may be photographed, For The Record, Inc. (301) 870-8025 - www.ftrinc.net - (800) 921-5555 5 Final Version Mobile Security Forum 6/4/2013 1 videotaped, webcast or otherwise recorded. By 2 participating in this event you are agreeing that your 3 image and anything you say or submit may be posted 4 indefinitely at ftc.gov or one of the Commission’s 5 publicly available social media sites. 6 With that, I’d like to introduce the Chairwoman 7 of the Federal Trade Commission, Edith Ramirez, who will 8 be giving us opening remarks to set the stage for the 9 rest of the day. Thank you to the Chairwoman and thank 10 you to all of you for participating. 11 (Applause.) 12 13 14 15 16 17 18 19 20 21 22 23 24 25 For The Record, Inc. (301) 870-8025 - www.ftrinc.net - (800) 921-5555 6 Final Version Mobile Security Forum 6/4/2013 1 OPENING REMARKS 2 CHAIRWOMAN RAMIREZ: Thank you, Emily, and 3 thanks to all of you for being here today. And welcome 4 to the FTC’s Mobile Security Forum. It’s no exaggeration 5 to say that we’re in the midst of a mobile revolution. 6 Today, consumers buy twice as many mobile devices as they 7 do PCs. Nearly a third of the consumers who use their 8 phones to get to the Internet say it’s their primary way 9 of reaching the web. And we’re starting to see the rise 10 of the mobile-only Internet user. 11 In the first quarter of this year, tablets and 12 smartphones accounted for over a fifth of all e-commerce 13 traffic in the U.S., compared to -- get this -- just 2 14 percent only two years ago. Smartphone users reach for 15 their phones an astonishing 150 times a day on average, 16 to send a text, check for email, occasionally make a 17 phone call, surf the web, or use an app. 18 Today, though, we’ll be turning away from our 19 addictive smartphones and tablets, or so I hope, to 20 consider the current state of mobile security, emerging 21 threats, and the measures industry, government, and 22 consumers can take to protect against security risks. 23 Our interest in mobile security is an outgrowth of the 24 FTC’s broad mandate to protect consumers, which includes 25 protecting them from threats to the use and enjoyment of For The Record, Inc. (301) 870-8025 - www.ftrinc.net - (800) 921-5555 7 Final Version Mobile Security Forum 6/4/2013 1 new technologies. 2 In the last decade, the FTC has been at the 3 forefront, along with our partners at the Justice 4 Department and in the states, of the fight against 5 spyware on the desktop computer. We’ve brought a dozen 6 enforcement actions against purveyors of spyware, from 7 rogue ISPs that distribute malware, to computers that 8 installed keystroke loggers that captured sensitive 9 information, to businesses that transmitted nuisance 10 adware that delivered popup ads. 11 Most recently, we brought a number of cases, 12 including an enforcement sweep initiated last fall 13 against marketers of PC scareware scams that operated in 14 the U.S. and across the globe. As consumers migrate to 15 smartphones and tablets in record numbers, we’re now also 16 turning our attention to the security of the mobile 17 environment. 18 We have three main tools at our disposal: law 19 enforcement, consumer and business education, and policy, 20 which includes promoting industry dialogue and advocating 21 best practices. On the enforcement front, we’ve already 22 begun to address mobile security with our first case in 23 this arena. In February, the Commission alleged that HTC 24 America, the mobile device maker, introduced an array of 25 security vulnerabilities in the course of customizing its For The Record, Inc. (301) 870-8025 - www.ftrinc.net - (800) 921-5555 8 Final Version Mobile Security Forum 6/4/2013 1 mobile devices, thereby putting at risk the sensitive 2 information of millions of consumers. 3 We charged HTC with violating the FTC Act's, 4 prohibitions on both deceptive and unfair practices. To 5 resolve the FTC’s charges, HTC agreed to establish a 6 comprehensive security program and undergo independent 7 security audits every other year for 20 years. Our 8 settlement also includes a provision that is the first of 9 its kind in an FTC order, and as far as I’m aware, the 10 first of its kind in any other U.S. or foreign agency 11 order: a requirement that HTC develop and release 12 software patches to fix the vulnerabilities on millions 13 of its devices. 14 But cases like HTC demand sophisticated 15 technological expertise and tools. And to make these 16 cases possible, we’ve created a forensic mobile lab to 17 allow FTC staff to conduct research and investigations. 18 We’ve brought in distinguished technologists, like Steve 19 Bellovin of Columbia University, and his predecessor, Ed 20 Felton of Princeton. And we’ve created a mobile unit to 21 ensure that we are alert to mobile issues in all of our 22 consumer protection work. 23 As to the FTC’s second tool, consumer and 24 business education, the good news is that some of you who 25 are with us today already offer an array of innovative For The Record, Inc.
Recommended publications
  • Watch out for Fake Virus Alerts
    State of West Virginia Cyber Security Tip ALERT West Virginia Office of Information Security and Controls – Jim Richards, WV Chief Information Security Officer WATCH OUT FOR FAKE VIRUS ALERTS Rogue security software, also known as "scareware," is software that appears to be beneficial from a security perspective (i.e. free virus scan) but provides limited or no security, generates erroneous or misleading alerts, or attempts to lure users into participating in fraudulent transactions. How does rogue security software get on my computer? Rogue security software designers create legitimate looking pop-up windows that advertise security update software. These windows might appear on your screen while you surf the web. The "updates" or "alerts" in the pop-up windows call for you to take some sort of action, such as clicking to install the software, accept recommended updates, or remove unwanted viruses or spyware. When you click, the rogue security software downloads to your computer. Rogue security software might also appear in the list of search results when you are searching for trustworthy antispyware software, so it is important to protect your computer. What does rogue security software do? Rogue security software might report a virus, even though your computer is actually clean. The software might also fail to report viruses when your computer is infected. Inversely, sometimes, when you download rogue security software, it will install a virus or other malicious software on your computer so that the software has something to detect. Some rogue security software might also: Lure you into a fraudulent transaction (for example, upgrading to a non-existent paid version of a program).
    [Show full text]
  • Android Malware Category and Family Detection and Identification Using Machine Learning
    Android Malware Category and Family Detection and Identification using Machine Learning Ahmed Hashem El Fiky1*, Ayman El Shenawy1, 2, Mohamed Ashraf Madkour1 1 Systems and Computer Engineering Dept., Faculty of Engineering, Al-Azhar University, Cairo, Egypt. 1 Systems and Computer Engineering Dept., Faculty of Engineering, Al-Azhar University, Cairo, Egypt. 2 Software Engineering and Information Technology, Faculty of Engineering and Technology, Egyptian Chinese University, Cairo, Egypt. [email protected] [email protected] [email protected] Abstract: Android malware is one of the most dangerous threats on the internet, and it's been on the rise for several years. Despite significant efforts in detecting and classifying android malware from innocuous android applications, there is still a long way to go. As a result, there is a need to provide a basic understanding of the behavior displayed by the most common Android malware categories and families. Each Android malware family and category has a distinct objective. As a result, it has impacted every corporate area, including healthcare, banking, transportation, government, and e-commerce. In this paper, we presented two machine- learning approaches for Dynamic Analysis of Android Malware: one for detecting and identifying Android Malware Categories and the other for detecting and identifying Android Malware Families, which was accomplished by analyzing a massive malware dataset with 14 prominent malware categories and 180 prominent malware families of CCCS-CIC- AndMal2020 dataset on Dynamic Layers. Our approach achieves in Android Malware Category detection more than 96 % accurate and achieves in Android Malware Family detection more than 99% accurate. Our approach provides a method for high-accuracy Dynamic Analysis of Android Malware while also shortening the time required to analyze smartphone malware.
    [Show full text]
  • A Poisoned Apple: the Analysis of Macos Malware Shlayer By: Minh D
    A Poisoned Apple: The Analysis of macOS Malware Shlayer by: Minh D. Nguyen Abstract Historically, the Microsoft Windows operating system family, which currently runs on more than 70 percent of computers in the world,7 has been the main target for malware. However, with the growing popularity of Apple’s MacBook products, the macOS operating system has become a new platform for attackers to target the general computer users. According to the 2016/2017 Security Report of AV-TEST, the number of malware samples for macOS detected in 2016 has increased by an astonishing 370 percent compared to the same figure in 2015.3 In order to address the rising interest of attackers in the macOS operating system, this project provides an analysis of a newly discovered malware for macOS, Shlayer, to reveal a well- known tactic that attackers can utilize to infect machines running on any operating system, and discusses possible countermeasures for this strategy. I. Introduction macOS is often hailed as a more secure operating system compared to its counterpart Microsoft Windows.2 However, in reality, many attacking techniques targeting Windows machines can also be applied to macOS machines. The analysis of the new Shlayer malware, discovered by researchers of Intego in February 2018,1 will reveal a familiar strategy that attackers often utilize to target victim machines without regards of the operating system. With the worldwide growth of macOS usage, it is important to recognize this attacking method and understand that in many cases, the success of an attack does not depend on the security of the operating system but on the awareness of the user.
    [Show full text]
  • Cyren's 2016 Cyberthreat Report
    2016 CYBERTHREAT Report AUTOMATED THREAT INTELLIGENCE: The Key to Preventing, Mitigating, and Identifying Cyber Breaches Introduction .................................................................................................4 The Cloud Sandbox Array: A New Tool Against Cybercrime .....................6 The Benefits of Big Data .......................................................................... 12 2016 Predictions....................................................................................... 14 Malware Newsmakers of 2015 ................................................................ 16 The Criminal Power of the Unknown ...................................................... 22 2015 Statistics: Android, Phishing, Malware, Spam ............................... 26 Table of Contents Table CYREN 2016 CYBERTHREAT REPORT 3 INTRODUCTION Lior Kohavi Chief Technical Officer, CYREN, Inc. There is a false perception that sophisticated attacks are too difficult to prevent and the only alternative is detection. But detection is NOT the new prevention. Cybersecurity professionals must make it their mission to STOP attacks, not just become proficient at detecting them. It's no secret that cybercriminals are willing to spend a lot of time and money to obtain the information they desire. And, the risk that these criminals will be caught and convicted is relatively low. Despite well-publicized botnet takedowns, like that of Darknode this past July, researchers estimate that less than 1% of cybercrimes receive a corresponding conviction.
    [Show full text]
  • Mac Security Report 2020
    Independent Tests of Anti-Virus Software Mac Security Test & Review TEST PERIOD : JUNE 2020 LANGUAGE : ENGLISH LAST REVISION : 26TH JUNE 2020 WWW.AV-COMPARATIVES.ORG Mac Security Report – June 2020 www.av-comparatives.org Contents MACS AND SECURITY SOFTWARE 3 SECURITY SOFTWARE FOR MACOS CATALINA 5 MALWARE PROTECTION TEST 6 RESULTS 7 SUMMARY 8 AV-COMPARATIVES’ MAC CERTIFICATION REQUIREMENTS 9 REVIEW FORMAT 10 AVAST SECURITY FOR MAC 11 AVG INTERNET SECURITY FOR MAC 14 AVIRA ANTIVIRUS PRO FOR MAC 18 BITDEFENDER ANTIVIRUS FOR MAC 21 CROWDSTRIKE FALCON PREVENT FOR MAC 24 FIREEYE ENDPOINT SECURITY FOR MACOS 27 KASPERSKY INTERNET SECURITY FOR MAC 29 POCKETBITS BITMEDIC PRO ANTIVIRUS 32 TREND MICRO ANTIVIRUS FOR MAC 36 APPENDIX – FEATURE LIST 39 COPYRIGHT AND DISCLAIMER 40 2 Mac Security Report – June 2020 www.av-comparatives.org Macs and Security Software It is an often-heard view that macOS computers don’t need antivirus protection. Whilst it is certainly true that the population of macOS malware is very tiny compared to that for Windows and Android, there have been instances of macOS malware 1 getting into the wild. Moreover, Apple Mac security needs to be considered in the wider context of other types of attacks 2. In addition, it should be noted that Apple themselves ship some anti-malware capabilities within macOS. Firstly, there is “Gatekeeper”, which warns when apps without a digital signature are run. Then there is “XProtect”, which checks files against known-malware signatures. Finally, Apple provide the MRT (Malware Removal Tool). Gatekeeper and MRT are essentially invisible to users and have no direct user interface for the user.
    [Show full text]
  • Table of Contents
    1 •••I I Table of Contents Freebies! 3 Rock 55 New Spring Titles 3 R&B it Rap * Dance 59 Women's Spirituality * New Age 12 Gospel 60 Recovery 24 Blues 61 Women's Music *• Feminist Music 25 Jazz 62 Comedy 37 Classical 63 Ladyslipper Top 40 37 Spoken 65 African 38 Babyslipper Catalog 66 Arabic * Middle Eastern 39 "Mehn's Music' 70 Asian 39 Videos 72 Celtic * British Isles 40 Kids'Videos 76 European 43 Songbooks, Posters 77 Latin American _ 43 Jewelry, Books 78 Native American 44 Cards, T-Shirts 80 Jewish 46 Ordering Information 84 Reggae 47 Donor Discount Club 84 Country 48 Order Blank 85 Folk * Traditional 49 Artist Index 86 Art exhibit at Horace Williams House spurs bride to change reception plans By Jennifer Brett FROM OUR "CONTROVERSIAL- SUffWriter COVER ARTIST, When Julie Wyne became engaged, she and her fiance planned to hold (heir SUDIE RAKUSIN wedding reception at the historic Horace Williams House on Rosemary Street. The Sabbats Series Notecards sOk But a controversial art exhibit dis­ A spectacular set of 8 color notecards^^ played in the house prompted Wyne to reproductions of original oil paintings by Sudie change her plans and move the Feb. IS Rakusin. Each personifies one Sabbat and holds the reception to the Siena Hotel. symbols, phase of the moon, the feeling of the season, The exhibit, by Hillsborough artist what is growing and being harvested...against a Sudie Rakusin, includes paintings of background color of the corresponding chakra. The 8 scantily clad and bare-breasted women. Sabbats are Winter Solstice, Candelmas, Spring "I have no problem with the gallery Equinox, Beltane/May Eve, Summer Solstice, showing the paintings," Wyne told The Lammas, Autumn Equinox, and Hallomas.
    [Show full text]
  • Extreme Digital Speech Contexts, Responses and Solutions
    EXTREME DIGITAL SPEECH CONTEXTS, RESPONSES AND SOLUTIONS Edited by Bharath Ganesh and Jonathan Bright EXTREME DIGITAL SPEECH CONTEXTS, RESPONSES AND SOLUTIONS Acknowledgements This report is an output from a workshop organised jointly by VOX-Pol and the Oxford Internet Institute in May 2018. The workshop was titled ‘Combating Online Extremism: State, Private Sector and Civil Society Responses’ and took place at St Antony’s College, Oxford. The report’s contributors and editors thank VOX-Pol for funding and helping organise the workshop. We are particularly grateful for support from Shahed Warreth, Sadhbh Byrne Ryan, Lisa McInerney and Maura Conway, and other VOX-Pol team members at Dublin City University. Both Dr Joel Busher (Coventry) and Dr Benjamin Lee (Lancaster) provided detailed reviews of all of the articles at their initial stages, encouraging valuable revisions to all of the pieces in this collection. We are very grateful for their participation in this project. In addition to their effort, this collection benefitted greatly from the efforts of two anonymous peer reviewers whose detailed comments have helped to improve the contributions from all the authors. ISBN: 978-1-873769-96-6 © VOX-Pol Network of Excellence, 2019 This material is offered free of charge for personal and non-commercial use, provided the source is acknowledged. For commercial or any other use, prior written permission must be obtained from VOX-Pol. In no case may this material be altered, sold or rented. Like all other VOX-Pol publications, this report can be downloaded free of charge from the VOX-Pol website: www.voxpol.eu Designed and typeset by Soapbox, www.soapbox.co.uk TABLE OF CONTENTS Contributors 5 Introduction 10 Bharath Ganesh and Jonathan Bright Extreme Digital Speech 15 Matti Pohjonen PART I.
    [Show full text]
  • Malware Risks and Mitigation Report
    MALWARE RISKS AND MITIGATION REPORT June 2011 BITS A DIVISION OF THE FINANCIAL SERVICES ROUNDTABLE 1001 PENNSYLVANIA AVENUE NW SUITE 500 SOUTH WASHINGTON, DC 20004 202-289-4322 WWW.BITS.ORG BITS Malware Risk and Mitigation Report Table of Contents 1. Executive Summary ..............................................................................................................3 2. Malware Evolution................................................................................................................3 2.1 Malware Categories...............................................................................................................................5 2.2 Malware Example .................................................................................................................................8 2.3 Polymorphic Malware ........................................................................................................................10 3. Malware Supply and Demand ............................................................................................ 10 3.1 The Malware Industry ........................................................................................................................11 3.2 Malware Supply Chain........................................................................................................................13 3.3 Beyond Crime......................................................................................................................................14 4. Malware in Financial
    [Show full text]
  • Ransomware Destructive Attack
    Ransomware Destructive Attack Jay Spreitzer, Vice President, Cyber Threat Management Wells Fargo Bank About - Jay Spreitzer Has over 18 years information security experience. Over the last 10 years as a senior member of a cyber intelligence team at Wells Fargo. Prior to joining Wells Fargo Jay retired from the US Army, after 23 years of service working in various technology and information security roles. He holds a Masters in Information Assurance and Security as well as multiple computer security certifications. 53 What is ransomware? Ransomware is a type of malware that can be covertly installed on a computer without knowledge or intention of the user that restricts access to the infected computer system in some way, and demands that the user pay a ransom to the malware operators to remove the restriction. Some forms of ransomware systematically encrypt files on the system's hard drive, which become difficult or impossible to decrypt without paying the ransom for the encryption key, while some may simply lock the system and display messages intended to coax the user into paying. 54 What is ransomware? Ransomware wreaking havoc in American and Canadian hospitals Tech & Science March 23, 2016 Spike in ransomware spam prompts warnings Technology, March 10, 2015 Ransomware alert issued by US and Canada following recent attacks April 4, 2016, Big paydays force hospitals to prepare for ransomware attacks Tech, April 23, 2016 55 The first known ransomwares and its evolution § AIDS Diskette ransomware discovered in 1989. § Contained a warning message in the letter regarding licensing fee and penalty. § Users were supposed to send a license fee to a PO box in Panama for "PC Cyborg Corporation.” 56 The first known ransomwares and its evolution Creates the file ATTENTION!!!.txt in every folder in which § Gpcoder was ransomware it encoded a file.
    [Show full text]
  • Ransomware in Windows and Android Platforms
    Ransomware in Windows and Android Platforms Abdulrahman Alzahrani, Ali Alshehri, Hani Alshahrani, Huirong Fu Department of Computer Science and Engineering Oakland University Rochester, Michigan 48309 Email: faalzahrani, aaalshehri, hmalshahrani, [email protected] Abstract—Malware proliferation and sophistication have Ransomware exhibits behavioral differences if compared to drastically increased and evolved continuously. Recent traditional malware. For instance, most malware types aim indiscriminate ransomware victimizations have imposed critical to steal users’ data, like banking credentials, without raising needs of effective detection techniques to prevent damages. Therefore, ransomware has drawn attention among cyberspace sus-picions. In contrast, ransomware operations behave researchers. This paper contributes a comprehensive overview of differently since the attack notifies victims that their devices ransomware attacks and summarizes existing detection and have been infected [7]. prevention techniques in both Windows and Android platforms. This paper focuses on Windows and Android, the plat-forms Moreover, it highlights the strengths and shortcomings of those frequently targeted by ransomware attacks due to their techniques and provides a comparison between them. popularity in both desktop and mobile market-share. The rest Furthermore, it gives recommendations to users and system administrators. of this paper is organized as follows. Section II defines the concept of ransomware, and illustrates the functionality and Index Terms—Windows ransomware, Android ransomware, how it works. Then, a brief overview of the history of crypto-ransomware, locker-ransomware, ransomware families, ransomware cyberattacks is provided in Section III. Section IV countermeasures lists the most affected industry sectors by malware attacks around the world. Next, Sections V and VI summarize the I. INTRODUCTION notable observed behaviors of ransomware in the Windows Cyber-extorting malware is increasing and evolving con- and Android platforms, respectively.
    [Show full text]
  • Understanding Android Financial Malware Attacks: Taxonomy, Characterization, and Challenges
    Understanding Android Financial Malware Attacks: Taxonomy, Characterization, and Challenges Andi Fitriah Abdul Kadir, Natalia Stakhanova and Ali A. Ghorbani Canadian Institute for Cybersecurity (CIC), University of New Brunswick, New Brunswick, Canada E-mail: andi.fitriah; natalia.stakhanova; [email protected] Received 18 February 2018; Accepted 12 April 2018; Publication 14 June 2018 Abstract With the increased number of financial-related malware, the security com- munity today has turned their attention to the Android financial malware. However, what constitutes Android financial malware is still ambiguous. A comprehensive understanding of the existing Android financial malware attacks supported by a unified terminology is necessarily required for the deployment of reliable defence mechanisms against these attacks. Thus, in this paper, we address this issue and devise a taxonomy of Android financial malware attacks. By devising the proposed taxonomy, we intend to: give researchers a better understanding of these attacks; explore the Android financial malware characteristics; and provide a foundation for organizing research efforts within this specific field. In order to evaluate the proposed tax- onomy, we gathered a large collection of Android financial malware samples representing 32 families, which are selected based on the main characteristics defined in the taxonomy. We discuss the characterization of these families in terms of malware installation, activation and attacks, and derive a set of research question: how does the malware spread to the Android users?, Journal of Cyber Security and Mobility, Vol. 7 3, 1–52. River Publishers doi: 10.13052/jcsm2245-1439.732 This is an Open Access publication. c 2018 the Author(s). All rights reserved.
    [Show full text]
  • For Seminar Attendees Only 1 1 the Next Frontier of Cyber Modeling
    ©2020 Verisk Analytics, Inc. CONFIDENTIAL: For Seminar Attendees Only 1 1 The Next Frontier of Cyber Modeling Scott Stransky Pamela Eck Vijay Raman ©2020 Verisk Analytics, Inc. CONFIDENTIAL: For Seminar Attendees Only 2 2 Agenda Recent Cyber Events Individual Risk Events Still Drive the Majority of Claims Systemic Ransomware Aggregation Beyond the Cloud Cyber as a Peril (aka Silent Cyber) Cyber Modeling Platform – Key Enhancements ©2020 Verisk Analytics, Inc. CONFIDENTIAL: For Seminar Attendees Only 3 3 Recent Events: Marriott and Continued Data Breaches Estimated insurance loss: USD 350 million ©2020 Verisk Analytics, Inc. CONFIDENTIAL: For Seminar Attendees Only 4 4 Recent Events: Norsk Hydro and the Targeted Ransomware Estimated insurance loss: GBP 75 million ©2020 Verisk Analytics, Inc. CONFIDENTIAL: For Seminar Attendees Only 5 5 Recent Events: NotPetya and the Rise of Systemic Ransomware Estimated insurance loss: USD 320 million (to traditional affirmative cyber policies) ©2020 Verisk Analytics, Inc. CONFIDENTIAL: For Seminar Attendees Only 6 6 Cyber Regulatory Environment Is Ramping Up GDPR fines Continue to Ramp Up New regulations in the U.S. Amount of Fines(Euros) month Counts of fines Counts of fines Source: enforcementtracker.com month ©2020 Verisk Analytics, Inc. CONFIDENTIAL: For Seminar Attendees Only 7 7 Individual Risk Events Still Drive the Majority of Claims ©2020 Verisk Analytics, Inc. CONFIDENTIAL: For Seminar Attendees Only 8 8 Individual Risk Modeling: The Next Generation of Data Compromise Business By Country Interruption Frequency Predictors Correlation by Attack by Attack Vector Vector ©2020 Verisk Analytics, Inc. CONFIDENTIAL: For Seminar Attendees Only 9 9 Business Interruption Continues to Drive Losses ©2020 Verisk Analytics, Inc.
    [Show full text]