• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Industry News   »   Current News   »   Users must make time for mobile security measures

Users must make time for mobile security measures

  • Posted on:October 17, 2011
  • Posted in:Current News, Vulnerabilities & Exploits
  • Posted by:
    Noah Gamer
0

It's been said that the decision to speed or text message while driving is a matter of the driver conducting a risk-reward assessment, whereas the reward for exceeding the speed limit, namely reaching the destination quicker, outweighs the risks, including the increased chance of an accident or receiving a ticket. It seems that the same is true for mobile security solutions.

However, in the latter case, users of mobile devices such as smartphones and tablets don't view the risk of malware infection or information loss essentially worth the effort needed to protect against such threats. That was recently discovered by researchers for Confident Technologies, a provider of image-based authentication solutions for Web pages and mobile applications.

The firm's in-depth report revealed that many mobile users willingly ignore data protection measures because they are viewed as too tedious. That led researchers to conclude that owners of smartphones and tablets prefer convenience over protecting possibly confidential information.

"However, people's lax security habits have made the mobile platform the new frontier for hackers, malware and fraud," Confident Technologies CEO Curtis Staker said. "The onerous process of typing complicated passwords on a smartphone for every app or online account means that people instead choose to sacrifice security for convenience, leaving themselves and in many cases their businesses at risk of data theft and fraud."

Overall, more than half of respondents to Confident's poll said they willingly do not use passwords or PIN numbers to lock their smartphones or tablets. Of these, 44 percent said utilizing a password is "too cumbersome." Also, another 30 percent of respondents said they "are not worried about the risk" of data loss or a data breach. That goes back to the risk-reward assessments that drivers also go through.

Researchers emphasize that mobile security risks are in fact real and can be extremely damaging for victims. In a recent interview with Macworld, one data security expert said there has been a 2,000 percent increase in the amount of malware targeting mobile devices running the Android operating system this year. That figure will grow to 6,000 percent during the next six months, according to the report.

"For any device, whether mobile or not, there’s always the threat of scams that are platform independent, meaning that every device is vulnerable to these," the Macworld report stated.

Still, users don't appear to be buying the mobile malware hype. Going back to the Confident Technologies report, the poll also found that smartphone and tablet owners also scoff at required security measures, such as the username and passwords required to access mobile applications.

Sixty-six percent of respondents said they try to remain logged into mobile applications at all times just to avoid the authentication process. Just 33 percent of respondents said they make a point to log into an app each time it's used.

Another 60 percent of respondents acknowledged they would like to see a form of authentication that is easier than leveraging a username and password.

Interestingly enough, a separate report from AdaptiveMobile revealed that many mobile users said they value data security more so than call quality. According to a recent poll of U.S. mobile phone owners, 68 percent of respondents said their carrier's most important responsibility is to keep confidential information protected. At 52 percent, just more than half said call quality was most important. Fifty-two percent of respondents also admitted to experiencing a mobile threat during the past year.

Related posts:

  1. Virtual IT environments requiring tougher data security measures
  2. Mobile data security misconceptions prevail
  3. Expert: As computing goes mobile, new security measures needed
  4. Companies must practice mobile security measures in 2012

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Cloud-based Email Threats Capitalized on Chaos of COVID-19
  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.