With advances in wireless technology, smart phones and PDA’s have evolved into many organizations mobile
computing device of choice. These devices are now able to operate on multiple networks (i.e. cellular carrier network
to a WiFi hotspot) and communicate with other devices via peer to peer communication, such as Bluetooth. The
proliferation and convergence of technologies, such as business process automation, mobile application deployment,
mobile commerce, mobile banking, and push email have generated widespread adoption of smart phones and PDA’s
across virtually all industries. As a result, threats to mobile operating systems are on the increase.
Mobile threats have escalated from simply a lost or stolen device scenario to more sophisticated, invisible attacks
designed to either cause irreparable harm to your mobile device or intercept sensitive company data.
Mobile devices have become the place where corporate data resides when it is beyond the firewall, and as such,
sensitive information is present on a variety of devices. This especially true in a field service environment where a field
worker is providing service at customer locations making customer account information is vulnerable. Malware can
secretly access information on the device and steal critical information such as a name, address, phone numbers,
credit card number and banking information. Loosing this information due to identity theft can have serious
consequences for an organization, including but not limited to fines.
UNAUTHORIZED DEVICE USAGE
An infected device can trigger unauthorized application behavior in which a connection from the mobile device to
the enterprise back-end can be triggered unknown to the end user or IT, and insert malware into the corporate
network, which could cause anything from unwanted, erratic network behavior to the erasure of valuable data
Snoopware is a subset of mobile malware that is capable of stealthily and remotely monitoring activities on mobile
devices. These snooping