Training

Enterprise Mobility Management / BYOD , Events , Fraud

Mobile Fraud

Mobile Fraud

Mobile banking is growing out of its infancy and experts predict it will soon be the dominant banking and payments channel. With the vast array of endpoints being utilized, how are the threats of rogue mobile apps, mobile malware and SMiShing evolving? What are the risks inherent in mobile payments? This session reviews these emerging mobile malware threats, their impact on banking institutions and the latest technology solutions to help mitigate the risks.

See Also: 12 Ways to Defeat Two-Factor Authentication

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

Background

Mobile has become the new security battlefield in which hackers and businesses are waging the internet-old battle of breach vs. protection. From infiltrating jailbroken devices to decompiling and recompiling apps to tainting source code, hackers are continually finding new ways to prove the mobile app infrastructure vulnerable. This session reviews these emerging mobile malware threats, their impact on banking institutions and the latest technology solutions to help mitigate the risks.

Richard Rushing, CISO at Motorola Mobility will kick-off the presentation with a discussion on the types of mobile fraud impacting organizations today, including:

  • Toll fraud/SMS fraud
  • Ad fraud/Click fraud
  • Rouge mobile banking applications
  • Mobile malware
  • SMSphishing/Apphishing

Tom Karren, CEO and Co-Founder of Moki will round out the session by offering insight and advice on how to secure your mobile applications.

This session was recorded during the 2014 Fraud Summit Toronto. Additional recordings include:

Slide Previews

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.