As we increasingly use mobile devices for most of our personal day-to-day business, they become increasingly attractive to bad actors. Attacks against mobile increasingly rely on cloaking themselves in legitimate forms, including impersonation of popular apps. As mobile operating system vendors continue to strengthen baseline security and restrict the interfaces that connect to sensitive capabilities, exploiting apps that already have legitimate access to those features will become a more efficient and useful technique. Organizations need to develop strategies that can keep up with the growing number of mobile devices and the increasingly sophisticated attacks mounted by cybercriminals.
Source: https://threatpost.com/building-mobile-defense/147564/

