10.06.2013 Views

Study into the Implications of Smartphone Operating System Security

Study into the Implications of Smartphone Operating System Security

Study into the Implications of Smartphone Operating System Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Study</strong> <strong>into</strong> <strong>the</strong> implications <strong>of</strong> <strong>Smartphone</strong> operating system security<br />

For instance a locked (tied to a MNO) iPhone 5 (16GB model) can be sold on online auction<br />

sites such as eBAY for between £350.00 and £400.00. That is a very good resell price as to<br />

buy a brand new 16GB iPhone 5 direct from Apple costs £529.00. 14<br />

In <strong>the</strong> main, reselling stolen <strong>Smartphone</strong>s will not be via legitimate auction sites such as<br />

eBAY and usually <strong>the</strong> actual thief will not sell <strong>the</strong> stolen goods <strong>the</strong>mselves. It is easy to see<br />

how <strong>the</strong> high second-hand demand for <strong>the</strong>se devices is driving <strong>the</strong> trend <strong>of</strong> rising stolen<br />

<strong>Smartphone</strong> numbers.<br />

Source: National Mobile Phone Crime Unit<br />

Get Safe Online’s Tony Neate, once a police <strong>of</strong>ficer himself, believes that <strong>the</strong> driver for <strong>the</strong>ft<br />

is <strong>the</strong> “actual value not <strong>the</strong> value <strong>of</strong> <strong>the</strong> information on it”. However, Neate thinks that this<br />

may change when <strong>the</strong> thieves begin to understand that <strong>the</strong>re may be more value in selling<br />

<strong>the</strong>se devices to organised crime gangs who may be more interested in <strong>the</strong> value <strong>of</strong><br />

extracting potentially valuable identity, personal and financial data from <strong>the</strong> device.<br />

For this to happen criminals need to believe that <strong>the</strong> value <strong>of</strong> this information has a higher<br />

value than <strong>the</strong> resell value <strong>of</strong> <strong>the</strong> device itself. Alternatively, if it becomes extremely difficult<br />

to resell stolen <strong>Smartphone</strong>s it may force criminals to rethink <strong>the</strong>ir business model.<br />

Is information safe on a <strong>Smartphone</strong>? But once a <strong>Smartphone</strong> is lost or stolen how easy<br />

is it to get access to <strong>the</strong> device and extract information from it?<br />

Consumer survey research from security vendors Norton (owned by Symantec) discovered<br />

that 35 percent <strong>of</strong> <strong>Smartphone</strong> owners used no PIN or password to protect <strong>the</strong>ir devices and<br />

a similar study by McAfee stated that <strong>the</strong> figure was as high as 50 percent. 15<br />

No PINS or Passwords: Most <strong>Smartphone</strong>s will have an option to lock <strong>the</strong> device, usually<br />

after a defined period <strong>of</strong> inactivity or after <strong>the</strong> user puts it <strong>into</strong> standby mode. To unlock <strong>the</strong><br />

device <strong>the</strong> user will be required to au<strong>the</strong>nticate <strong>into</strong> <strong>the</strong> <strong>Smartphone</strong>, usually by using a PIN<br />

or a password. The problem is that not all <strong>Smartphone</strong> owners will set-up a PIN or password<br />

and if <strong>the</strong>y do this protection may be easily bypassed by using a weak PIN or password that<br />

can be guessed.<br />

14 Cost as at 16 th March 2013 and obtained from www.store.apple.com<br />

15 Hackers, viruses, phishing: why all smartphone and tablet users need to know about mobile<br />

security. www.broadbandgenie.co.uk, 8 th March 2013:<br />

http://www.broadbandgenie.co.uk/blog/20130308-hackers-viruses-phishing-why-all-smartphonetablet-users-need-know-about-mobile-security<br />

Goode Intelligence © 2013 P a g e | 30 www.goodeintelligence.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!