According to a new report from Secureworks, endpoint attack vectors that include email, popular operating systems, and apps are on the rise.
In response to attacks by way of Android apps, Google has removed thousands of nefarious apps that had the capability to launch malware enabling developers to launch a wide array of attacks including Distributed Denial of Service (DDoS) attacks, Man-in-the-Middle (MitM), and Ransomware attacks.
It is a little-known fact that bad actors can launch attacks on networks and critical infrastructure by way of popular operating systems that support surveillance and data mining technologies.
Popular operating systems also support intrusive apps that are distributed in Google Play, Apple App Store, and Microsoft Windows App Store.
Apple who is noted for privacy and security was attacked by bad actors who were exploiting flaws within iOS and their mobile device management platform to gain access to sensitive corporate data.
Unfortunately, business depends on a apps supported by popular operating systems that in turn support centralization.
This means that popular operating systems, such as Android, are intentionally designed to support intrusive apps that are developed for consumerism rather than developed for security and privacy.
This means that popular operating systems could be described as “leaky” since the operating systems support intrusive apps, such as Facebook, that can be classified as “Legal Malware”.
For example, an intrusive app, such as TikTok, enables the developer to monitor, track, and data mine the end user 24×7/365 days per year for financial gain.
Apps that are designed to enable the developer to surveil & data mine the end user pose numerous security and privacy threats to the end user, including the end user’s employer.
Due to the proliferation of bring your own device (BYOD) programs, many people use their smartphones for business purposes inadvertently leaking highly confidential business information to unauthorized third parties that included app developers from around the world.
Security, privacy, safety, and freedom start at the foundational level, up through the supply chain, firmware, operating system, software, and apps.
With these security measures in mind, Purism has developed a secure OS that in turn supports secure apps.
We developed a fully auditable, private, and secure operating system, PureOS, that supports convergence whether you’re accessing your information on a smartphone, laptop, PC, or network server manufactured by Purism.
In closing, it is important to prioritize endpoint cybersecurity through secure and private devices while employing best practices from the boardroom, C-Suite, to the frontline employee.