Tag: cyber security

Australia is seeing more cyber attacks as mobile commerce flourishes

Cyber attacks growing more common in Australia and other countries

Cyber attacks are becoming more frequent in Australia as mobile usage continues to grow throughout the country. With mobile devices becoming more common, so too is mobile commerce. According to a new report from ThreatMetrix, mobile devices now account for 31% of all transactions made in the country. This has made Australia a very attractive target for malicious groups that would like to take advantage of consumers and businesses that are involved in mobile commerce.

Mobile commerce has become an attractive target for malicious groups

The report from ThreatMetrix shows that Australia is in the top 10 countries around the world when it comes to cyber attacks and serious security threats. Targeted attacks are becoming much more prevalent in the country, as consumers are finding themselves increasingly exposed to cyber attacks when they participate in mobile commerce. The report notes that digital identities are now a form of global currency, as a person’s identity has a significant amount of financial data associated with it.

Growing number of transactions are proven to be fraudulent

Mobile Commerce - Cyber SecurityThreatMetrix has monitored many mobile payments made in Australia and other countries. Approximately 20% of the transactions that the organization monitored were payment related, with 3.1% of these mobile payments being flagged as representing malicious attack traffic. The company’s report shows that an estimated 3.1% of account creation on mobile commerce platforms was fraudulent as well. The growing use of mobile applications is being linked to the rise in security threats and cyber attacks in the mobile commerce space as well as others.

Security issues are a concern for consumers, but mobile commerce continues to grow in Australia and elsewhere

Security concerns have plagued the mobile commerce space for some time. These concerns have prevented many consumers from using their mobile devices to purchase products either online or in physical stores. Despite the security concerns, however, mobile commerce continues to grow and companies involved in this space have been investing in improved security and the use of new technology that can protect consumer financial information.

Mobile security of wearable tech data called into question

A new report by ABI Research has revealed that wearables are rapidly increasingly in popularity.

The wearable technology market is moving quite quickly throughout 2014, but despite its popularity, the use of these devices could be placing consumers at an ever rising risk of a mobile security breach.

An ABI Research report claims that there will be 485 million shipments of wearables by 2018.

Among the most popular devices in the wearables category includes those that allow for the tracking of health and fitness data. They also often allow this data to be shared with friends, coworkers, or between doctors and patients. However, each new activity that is logged may also be opening up the user to a new mobile security breach risk.

This mobile security speculation by many in the wearables industry has been underscored by Symantec research results.

Mobile Security - Wearable TechOn June 7, 2014, that company’s Security Response team looked at the most popular mobile apps at the Apple App Store and examined the most popular iOS compatible offerings within the free “health & fitness” category. It then tested the 100 most popular options within that category. Among them, there were 57 that were also available in the Google Play store so that Android device users would be able to them. Those 57 were also researched on the Android side, by the Symantec team.

What the Security Response team found was that 20 percent of the apps that they examined required a user to use non encrypted (clear) text which exposed their login credentials. This means that in the case of the users of those popular free applications, it could be possible for the device or the app to be compromised.

Furthermore, depending on when and where the wearable device is synced, it could mean that those login credentials will be shared with just about anyone who is paying attention. The typical wearable technology does not connect directly to the internet. Instead, it uses Bluetooth synchronization to an internet enabled smartphone, tablet, or desktop. This process may be making it much easier for cybercriminals to breach mobile security and scoop up personal data from the device user, without ever making him or her aware that it had occurred.