40 likes | 185 Vues
The insights from 2011 highlight various development philosophies in mobile applications, emphasizing the trade-off between rapid development and the need for robust security. As mobile technology evolved, the focus shifted toward quick market entry with minimal documentation, often leaving room for errors. The rise of mobile malware, particularly through malicious applications and transformed QR codes, presents ongoing challenges for user security. This report also discusses the perceived value of data stored on smartphones and critical concerns like juice jacking that exploit charging interfaces.
E N D
Key Lessons from 2011 What Have We Learnt? • Different Development Philosophies Banks • Focus on Security and Interoperability • Lots of documentation, Minimal Change • Restricts innovation ? Mobile Application Developers • Fast to market, regular addition of new features • “Rapid Development” (minimal documentation) • Opportunity for errors? We will fix them in later releases Please Copy and Distribute
Key Lessons from 2011 Risk – Products are Insecure What a card looks like to a Square credit card reader Please Copy and Distribute
Key Lessons from 2011 Perceived Value of Data on Phone • What is the Value of the Data on Your Smartphone • iPhone sales in Lagos • Same Connector used to Charge and Back Up Data • Juice Jacking (DefCon 2011) • Mobile charging point that doesn’t just charge your mobile device but instead takes advantage of automatic sync capabilities Please Copy and Distribute
Key Lessons from 2011 Malicious Applications • Mobile Malware • Applications that seek to retrieve credentials or fake transactions • Principally Key-Loggers or Trojans • QR Codes have been used to spread Malware • Increase MNO’s Customer Service Costs • Smart Tags Deliver the Same Functionality • Sales of Mobile Anti- Virus Software is Minimal Please Copy and Distribute