Mobile phones and other networked smart devices are everywhere. They are in our pockets, automobiles, appliances and wearables on our bodies. We have entertainment at our finger tips, connection to our social networks and access to any and all information. However, these very capabilities make these devices vulnerable to tampering, often without physical contact. Their interconnectedness, allowing them to form “clusters,” enables hackers to create “botnets” of infected devices that cause mischief, inconvenience and even physical risks to users. Attackers and smart device malware often look for vulnerabilities to gain root access on the device. Using this access, attackers could target communications, location data, install more malware, or steal sensitive and confidential information. Additionally, it can replicate itself, moving from one device to another, eventually compromising a cluster of connected devices and exploiting interactions between them. The widespread use of ‘cracked’ apps represents a real and present danger given the explosion of smartphone and tablet use in the workplace and home.
Do you have a good security program today? The cyber storm is coming, are you ready? Ask yourself. Come join IBM security experts to learn how getting educated and taking the necessary steps now can reduce the risk of an attack or help you quickly remediate in the event of an attack