Global Security Insights for Mobile Reports
GSIM 8 – Mobile Security Threats: Conflict, Combat and Culture in the US
This 8th edition of the Global Security Insights for Mobile report (GSIM) showcases characteristics of modern spam warfare in the US and how spammers are benefiting from SMS services, based on unique intelligence from AdaptiveMobile’s Security Center. The report will explore how the changing cultural and technological landscape is altering the shape of mobile abuse and fraud, and address current challenges.
GSIM 7 - Protecting the Borderless Network
Operators are facing a rapidly changing threat landscape - threats are no longer confined to signalling attacks on their network or internal fraud – they are now facing sophisticated attacks with the rapid emergence of the Borderless Network. Security threats are no longer limited by national boundaries or network bearers, as cyber criminals use social networks, instant messaging, OTT services and smartphone apps as integrated attack vectors into and across a modern telecoms network.
GSIM 6 - Ultimate Network Defence - Fighting the Rising Tide of SMS spam
AdaptiveMobile’s latest consumer insights and security recommendations. Security research and unique user insight, this GSIM explores the real SMS spam threats that plague today’s mobile users.
GSIM 5 - Too much, too young? Parental Controls in the age of the smartphone
As smartphone usage amongst children has escalated in recent years, so too has the range and depth of security threats that such devices present. It is increasingly important that parents understand their children’s mobile and online lifestyles and protect them from danger, in the same way they do on their PCs or laptops. Mobile operators are only just beginning to address this issue, leaving parents in a security limbo - wanting the peace of mind brought by giving phones to their children, but concerned about the host of risks their children are exposed to, ranging from cyber bullying or unsolicited contact from strangers, to access to inappropriate content.
This report investigates the extent to which parents are effectively able to balance empowering and protecting their children and where operators fit in this equation.
GSIM 4 - machine-to-machine: future threat?
These are exciting times for the wireless machine-to-machine (M2M) industry. Across the world, tens of millions of M2M connections are revolutionising the way that companies of all kinds do business.
Across a broad range of sectors, significant gains are being made thanks to the promise of M2M, enabling innovations in industries stretching from healthcare to utilities, automotive to security. At the same time, as with all mobile communications, vital considerations remain around the issue of security.
For a number of reasons - ranging from the size of the future market to the significant repercussions that could result in potential security lapses - this consideration is one that we believe deserves special attention. In this report, we take an in-depth look at why.
GSIM 3 - The True Cost of Free
The smartphone is in overdrive. The launch of Apple’s iPhone 4S, while perhaps not as emotionally fervent as was expected - dulled as it was by the company’s failure to produce a true fifth generation model - was nothing short of spectacular economically, global sales of the 4S reaching a record-breaking 4million handsets in its first three days on shelves.
That initial run of 4million will go some way to fuelling the continued global rise of the smartphone, market research firm IDC forecasting the shipment of some 472million such devices in 2011, up on the 304million that the firm tracked during 2010.
This near 200million rise in devices shipped worldwide is mirrored by the equally phenomenal success of the app. An industry that existed only on the fringes just a few short years ago, some estimates place it at a global value of some £12billion by 2012, representing a total download figure that is fast approaching 50 billion.
But apps are not the only driving force behind the smartphone revolution. International digital analytics firm ComScore highlighted at the end of 2010 that 30 percent of US and 22 percent of European mobile users are now using their device for email, creeping slowly towards the levels of SMS usage (68 percent and 88 percent respectively).
While many consumers look to Apple’s iOS to lead the way within this growing market, it does not sit alone in this buoyant arena. IDC research shows that Android is expected to capture almost 39 percent of the worldwide smartphone market this year, with Symbian following in second place with almost 21 percent and Apple a close third at 18 percent.
And Android is expected to dominate well into the future as well. IDC sees the Android OS holding almost 44 percent of the market by 2015, Symbian having fallen away to just 0.1 percent, with Windows Mobile expected to take its place with a 20 percent share.
As the sophistication of these operating systems increases, so too does the functionality and our ability to do more with our smartphones. But what is the onward impact on both our privacy and the security of our information when we use those facilities?
This report looks in more depth at how the rise to power of the smartphone has created a number of new security threats to consumers, and to what degree users are aware of these issues.
GSIM 2 - Mobile Trust & Security Barometer
More than just handsets, mobile phones are now personal data centres – containing everything from contact information and photos to banking details and passwords. As such, smartphones, in particular, are now a key target for mobile security attacks.
Whilst there is evidence that smartphones have reduced levels of customer churn in the industry, through a combination of contract conditions plus value-added services, how mobile network operators respond to ever evolving mobile security threats and safeguard their customers’ data will determine whether customer relationships continue to be characterised by trust and loyalty.
AdaptiveMobile, a leading provider of mobile security solutions, commissioned Loudhouse, an independent marketing research consultancy to conduct a survey of smartphone users to investigate current levels of subscriber trust in mobile network operators, and the factors that serve to both build and erode that trust. It also discloses how mobile security threats are influencing levels of trust and loyalty. The research comprised of 1000 online interviews with UK smartphone users during May 2011.
Key to the findings in the research is the priority given by consumers to protection from security threats over service quality as a foundation stone of trust between subscriber and mobile network operator. The research shows that mobile network operators are trusted more than other service providers at present, but if this trust is broken, 9 out of 10 customers will consider changing operator and share any negative experiences with others: mobile network operators therefore risk potential reputational damage, increased churn and financial harm if they fail to safeguard their users’ personal data and spend.
The survey finds users concerned about mobile security yet unsure about how to protect themselves from this growing threat, holding mobile network operators to account for security breaches whilst simultaneously looking to them, as trusted service providers, to safeguard their data and devices.
The AdaptiveMobile Global Security Insight for Mobile (GSIM) report looks at some of the biggest changes to the mobile security market, a significantly changed landscape for the network operator and consumer alike. 7 years on from what is recognised as the first mobile virus, Cabir, in 2004, the GSIM report provides for the first time, a detailed insight into and analysis of the new breed of threats facing mobile networks today.
With the explosive growth in mobile data usage, the proliferation of smart devices, open operating systems and hyper-connectivity, consumers and enterprises alike are increasingly relying on the mobile device as the “trusted hub” of their connected social and business networks. In recent years, the industry has witnessed a step-change in connectivity and usage, with the boundaries blurring between the PC and mobile handset.
Based on unique insight into the world’s largest operator groups, the GSIM explores a number of important challenges facing the mobile industry moving forwards and why the criminal community is increasingly turning its attention to mobile.