For some time, I have seen malware protection suites for Android OS provided by Google Play. Yet, I wondered how iOS mobile devices are being protected from outside, malicious attacks. It was the general consensus that, iOS did not suffer from many vulnerabilities or attacks because the OS continuously updates itself, the iOS market ‘screens’ it’s entries, and that there not many back-door entries to attack the iOS. Until recently, IT consultants from a mobile security company called, Skycure thinks otherwise. They believe, it is a matter of time until someone finds a way to attack these devices.
How will future attacks be combated? The article is featured on Securityweek, called Security Monitors Network Activity of iOS Devices for Security, by Brian Prince. It talks about a method developed by Skycure, that identifies impeding attackers before anything happens. How does this work?
- A ‘honeypot’ method is used to attract attackers, to give up actions that would otherwise elicit an impeding attack (SecurityWeek, 2013)
As defined by Symantec, there are various different types of honeypots. Honeypots are controlled environments; a replica server that monitors the behaviors of an attacker by mimicking end-user behavior, which lures an attacker to perform attacks to the server.
Skycure believes that traditional methods for detecting malware attacks are getting outdated. Jared Carleton, the principle consultant at Frost & Sullivan, states in the SecurityWeek article, “Whether it be through social engineering or exploitation of vulnerabilities, devices are vulnerable, and solutions such as those from Skycure will soon become a base requirement for companies.” The premise of this project is to protect and detect against malicious attacks, not to eliminate the attacks. It is a stepping stone, that which specialists can use to develop a patch, to counter the attack in the future.
According to the article, Skycure‘s solution hopes to cover three different areas in mobile security, which include: “attacks from the Internet, attacks from the device toward the corporate intranet, and attacks that result in sensitive data being leaked out of the device.” (SecurityWeek, 2013)
Prince, B. (2013, October 17). Skycure Monitors Network Activity of iOS Devices for Security | SecurityWeek.Com. Security Week. Retrieved November 11, 2013, from http://www.securityweek.com/skycure-monitors-network-activity-ios-devices-security
Riden, J., & Seifert, C. (2010, November 2). A Guide to Different Kinds of Honeypots. Endpoint, Cloud, Mobile & Virtual Security Solutions. Retrieved November 11, 2013, from http://www.symantec.com/connect/articles/guide-different-kinds-honeypots