Mobile Security

Mobile security
Protect yourself from thieves. Use strong passwords and encrypt your mobile device. Stay safe from targeted attacks and use good security option

Mobile security is the protection of smart phones, tablets, laptops and other portable computing devices and the networks they connect to from threats and vulnerabilities associated with wireless computing Mobiles security is also known as wireless security.

What is Mobile Security

Today’s large companies each spend an average of $40 million annually to develop mobile apps we use to shop, bank, departmental store and more.

However, only an average of 7% of this immense budget is spent on securing these apps against hackers and security breaches. 50% of companies have zero budget dedicated to securing their mobile apps.

How Secure are your Mobile apps?

  • 75% Don’t use proper encryption when storing data on a mobile device.
  • 98% Have access to private data without appropriate security measures.
  • 78% Mobile security breaches will be the result of exploiting poorly developed mobile apps.

Types of Mobile Malware

A study showed 8 out of 10 malware instances were worms spready by USB Removable devices.

MCAffe antivirus found that 10% of mobile devices are infected more than 400 new threats every minute.

  • Adware = Spyware that collects information about the user to relay to a third party for purchasing patterns. Usually disguised as a legitimate app.
  • Bots= Applications that can run in background undetected. Can be quite sophisticated and adaptable May have capability to contact botmasters to execute commands.
  • Trojans= Varying effects that can be mildly annoying or completely destructive. Usually are hidden and attached to applications that seem harmless. Ransomware is typically a member of this family of mobile malware. Can be quite sophisticated and adaptable
  • Phishing= Website that are set up to entice users to enter, then steal credentials and personal information.
  • Spyware= Monitors, logs, and shares information with remote servers on personal activity, text messages, e-mails, voice recordings, phone calls, contact lists, location, pictures, status etc.

The Ricks Behind the Apps

Malicious Behaviors

  • Accesses device management and restricted security ApIs necessarily
  • Accesses or requests super user permission
  • Exploits operating system or zero-day vulnerabilities
  • Roots or jailbreaks device
  • Steals login credentials
  • Communicates with known malicious IP addresses and domains

Moderate Risk Behaviors

  • May be a risk if performed by apps from unknown or untrusted sources
  • Reads and Sends e-mails
  • Read and sends SMS messages
  • Reads and sends GPS information

Dangerous Behaviors

  • Uploads user information without permission or without notifying user
  • Includes SSL vulnerabilities that enable communications to be intercepted
  • No privacy policy or refers to an invalid privacy policy
  • Installs boot time startup item

Mobile Security in the world statistics

  • More than 69% of adults have had a mobile devices stolen or lost
  • Yet 9/10 of people don’t use mobile security applications that could help them protect data when someone else has the device.
  • 89% of those surveyed do not back up their phone data
  • 78% of those surveyed do not use a screen lock or password to access their device
  • Although 83% of us are aware of the increased security risk of public WiFi, 76% still connect to public networks

Mobility is changing the way we live and work

  • Internet connected mobile devices are set to outnumber human
  • 82% of employees store sensitive company data on mobile devices
  • 89% of tablets used by mobile workers are personally owned
  • Mobile works now carry on average 3 devices Laptop, Mobile and Tablet
  • 63% of people check their mobile phone in the morning before getting up
  • Half of the devices on corporate networks will be mobile devices by 2019

Which types of applications or systems present the highest security risk to your business?

  • Customer facing web apps = 33%
  • Mobile apps = 25%
  • Desktop apps = 12%
  • Embedded systems = 21%
  • internally facing web apps = 9%

Ways to Block Mobile Attack

Don’t let your guard down just because you’re on a mobile device. Be just as careful as you would on a desktop!

  • WiFi
    . Don’t allow your device to auto-join unfamiliar networks
    . Always turn off WiFi when you are’nt using it or don’t need it
    . Never send sensitive information over WiFi unless you’re absolutely sure it’s secure networks
  • Apps
    . Only use apps available in your device’s official store – Never download from a browser.
    . Be wary of apps from unknown developers or those with limited/ bad reviews.
    . Keep them updated to ensure they have the latest security.
    . If they are no longer supported by your store, just delete it.
    . Don’t grant administrator, or excessive privileges to apps unless you truly trust them.
  • Browser
    . Watch out for ads, giveways and contests that seem too good to be true. Often these lead to phishing sites that appear to be legit.
    . Pay close attention to URLs. these are harder to verify on mobile screens but it’s worth the effort.
    . Never save your login information when you’re using a web browser.
Please follow and like us:

Blockchain Technology

What is blockchain?

The block chain is a database of information. This information is not stored in a single place, but across a variety of data servers that participate in the network, this is what is meant by “decentralized” there is no central point. Identities are kept completely private, through the cryptography, however all transactions that happen on the block chain are open to viewing by anyone at any tie for always.

Trust in the block chain is enough to transact with anyone. Every record that’s written on a block chain is secured by a unique cryptographic key, making the block chain and it’s information immutable.

How Does a Block chain Work

  • A user requests for a transaction
  • A block representing the transaction is created
  • The block is broadcast-ed to all the nodes of the network
  • All the nodes validate the block and the transaction
  • The block chain is added to the chain
  • The transaction gets verified and executed

How to create a blockchain transaction?

  • When 2 parties initiate a transaction, blockchain assigns an encryption
  • Blockchain verifies the transaction and creates a block
  • The new block is appended to the blockchain
  • The blockchain transaction is now complete and the ledger is updated

Blockchain Checklist

  • Database: Block chain is a unique shared database technology. A block chain project must use a structured data repository
  • Mistrust: Block chain implies multiple non-trusting writers. They don’t allow other users to modify their entries.
  • Interaction: The block chain transactions often depend on another writer’s transactions created collaboratively without exposing the parties to risks
  • Writers: Block chain relies on multiple writers who generate transactions modifying the database
  • Disinter Mediation: No central gatekeeper needed to verify transactions and  authenticate their sources
  • Rules: The database is modified by various non-trusting writers. It must contain integrated rules that restrain the transactions and define legitimate transactions.

7 Ways the blockchain can help the environment

  • Environmental treaties:  Track real impact and compliance of environmental treaties decrease fraud and manipulation
  • Non-Profits: Track where donations are going decrease inefficiency and bureaucracy in charities
  • Carbon Tax: Calculate tax for products based on carbon footprint create a reputation system for companies based on emissions
  • Changing Incentives: Align incentives with sustainable practices create incentives for people to act in sustainable ways
  • Supply Chains: Transparently track products from origin to store shelf reduce carbon footprint and unsustainable practices.
  • Recycling: Encourage recycling by providing tokenized reward track and evaluate efficacy of recycling programs
  • Energy: Increase efficiency with P2P electrical grids improve access to power in areas with poverty or natural disasters.

Enterprises Which are Implementing Block chain Technology

Data Protection

  • Apple: Patented block chain technology for time stamping data
  • Facebook: Exploring the use of block chain to enhance data security and users privacy.
  • Google: Exploring the use of block chain technology to enhance cloud services security and for data protection.
  • Baidu: Using block chain to enhance intellectual rights management.


  • Ford: Leveraging block chain technology to enhance the mobility of technologies.
  • Toyota: Planning to use block chain technology to enhance autonomous driving technology
  • British Airways: Implementing block chain to manage flight data as well as verifying travelers identity

Data Integrity

  • AIA Group: Launched the first of it’s kind bancassurance for sharing policy data


  • United Health Care: Using block chain technology to improve doctors directories to enable accurate insurance claim fillings.
  • MetLife : Using block chain technology for storing patients medical records for insurance purposes.

Supply Chains

  • Walmart: Using block chain technology to track product movement from farmers to stores.
  • Samsung: Intends to use block chain technology to enhance supply chain management when it comes to electronics shipments.
  • UPS : Block Chain powered logistics monitoring and management solution
  • Maersk: Block chain system for tracking movement of shipments between ports.
  • Nestle: Using block chain technology in supply management to track baby food products.


  • FeedEx: Working on block chain solution for setting customer disputes.
  • BHP Billiton: Leveraging block chain technology for supply chains management.
  • Prudential: Unveils a block chain powered trading platform for small and medium sized enterprises.


  • Tencent: A solution for verifying invoice authenticity and for ensuring tax compliance.
  • Alibaba: Using block chain technology to track luxury goods in it’s e-commerce platforms.
Please follow and like us:

Social Engineering Attacks

An attack or a hack through which the attacker users social skills via human interaction to obtain or compromise information about an organization or its computer systems is known as a social engineering attacks. Your data is at risk everyday through social engineering attacks because hacking a human is much easier than hacking a business.

What motivates social engineers?

  • Obtaining personal information.
  • Gaining unauthorized access.
  • Circumventing established procedures.
  • Because they can.

Common Attacks

Personal Approach :- In personal approaches, the social engineering may directly ask for approach in general meeting or gathering and get personal or critical information directly or indirectly about you.

Telephone :- Request information usually through the imitation of a legitimate bank/company through system to get critical information such as bank/credit card data.

Online :- Internet connectivity enables attackers to approach individuals or employee an anonymous internet source and convince them to provide information through a believable user.

Ransomware a Nightmare for Businesses

Ransomware is an attack that installs covertly on a company’s computer

Ransomware is an attack that installs covertly on a company’s computer, blocking or limiting user access and demanding a ransom payment to restore it. This is one of the fastest growing cyber threats and is expected to increase 400% every years.

The state of ransomware

  • 25% of organizations had to cease business operations immediately because of ransomware.
  • 81% of business have experienced a cyber attack.
  • 66% have suffered a data breach
  • 35% were victims of ransomware
  • 72% of companies affected by ransomware that could not access data for at least 2 days following the attack.
  • 32% that lost access to their data for
  • $10-$50 million estimated monthly income for cyber criminals from ransomware

Ways to Stop Social Engineering Attack

  • Walk through company and make sure employees are not leaving personal or sensitive information in plain view of passing people such as e-mail accounts, login information, passwords etc.
  • Use dummy accounts to monitor networks, and also use the admin account as a dummy as well and monitor who attempts to access it and trap them in the act.
  • Make a security policy that enforces that passwords must contain a certain combination of words,numbers and characters.
  • Never allow an employee to leave their terminal or desk without first logging out of their respected machine or workstation

Tips for Avoiding a Social Engineering Attack

  • Limit public information:- Limit the amount of personal information that you share online.
  • Be a skeptical:- Always question requests for sensitive information.
  • Trust but verify:- Don’t share information with people you don’t know unless you can verify their identity.
  • Call them back:- Through the main switchboard if possible.
  • No password over the phone:- Never share your password with anyone over the phone

Spot Fake E-mails and Stay Safe

In June 2015, famous company Ubiquiti networks Inc. willing wired $46.7 million to fake bank accounts in china. Why? Because the company CEO asked them to an email. Of course, the actual CEO never made any such request a group of hackers did.

  • Contact information:- The email contains a generic salutation or lacks any contact information for the recipient to use if they have questions.
  • Spelling and grammar errors:- The email contains clear spelling or grammatical errors or emails from legitimate companies are normally proof read extensively before sending.
  • Requests personal information:- The email requests that you follow a link to log in, or request personal information such as a credit card pin number or password.
  • High urgency or threats:- The email creates a high sense of urgency, or threatens consequences for inaction.
  • Fake web links:- The sender’s displayed name and email address do not match the purported company the email represents, or the links send the recipient to other websites not associated with the purported company

Notes : 80% of attacks are phishing

Cyber Scams

Social engineering exploits the goodwill of unwitting victims. Here’s how….

  • Website Spoofing:- Bogus websites masquerade as the real thing, tricking victims into sharing sensitive information.
  • Phishing :- Emails impersonate legitimate businesses to acquire information. This websites will request information through forms ad offer downloads containing malware.
  • Social Media Phishing :- In social media phishing is when attackers use social networking sites like Facebook, Twitter and Instagram instead of email to obtain your sensitive personal information or click on malicious links.
  • Baiting :- In baiting, the attacker dangles something enticing to move his victim to action. Physical media sources loaded with malware infect computers and steal information.
  • Impersonation :- Scammer impersonates a trusted sources online or in person to obtain valuable information
  • Poser :- Attackers poses as a vendor, client or employee and sends email from what links like a reputable source.

How to Spot a Phishing

Phishing is a technique used to fraudulently obtain usernames, passwords, credit card numbers and other sensitive information.

Fraudulent emails typically ask you to:

  • Open an attachment
  • Click on link, redirecting you to a malicious website.
  • You may be prompted to enter personal information.

Types of Phishing Attacks

  • Spear Phishing: A highly targeted form of phishing that hones in on a specific group of individuals or organization.
  • Whaling: A form of phishing, targeted at executive level individuals.
  • Cloning: Whereby a legitimate email is duplicated but, the content is replaced with malicious links or attachments.

Please follow and like us:

Social Network Security – SNS

What is social network?

Social networks are websites or apps that allow people to connect with friends and even make new fiends, virtually, and share content, interact, create communities of similar interests such as Working, games reading friendship relationships etc.

A social network has always existed, but the way in which it connects has changed dramatically .Some most popular social networks or social media apps are Facebook, Twitter, Yahoo, Blogger and LinkedIn.

If you’re not using SOCIAL to DRIVE TRAFFIC and therefore leads that convert to revenue, your brand is LOSING OUT.

Sam Hurley

Stay safe on the Internet

Be a smart in social media can reduce many cyber bullying problems such as hacking, cracking, phishing etc. Do you know about meaning of SMART in social media?

  • S = Be safe –> Keep your personal information safe and secret. Think carefully before you share a photo of yourself or your friends.
  • M = Don’t Meet Up –> Never arrange to meet an online friend because it can be dangerous. No matter how well you think you know people, they might be pretending.
  • A = Accepting E-mails can be dangerous –> If you receive junk mail or spam messages that make you feel uncomfortable, tell an adult that you trust and delete them. Don’t replay to them.
  • R = Reliable? –> The Internet is full of friendly people and amazing information. However, sometimes people might say or write things which are untrue, so you should always think carefully before trusting what you see or hear.
  • T = Tell Someone! –> Most of the tie that you are online, you will have lots of fun. However , if you see anything that makes you feel uncomfortable or worried, make sure that you tell an adult that you trust.
  • Use passwords that are difficult to predict.
  • Avoid over-sharing information on social media.
  • Use secure modes of payment such as PayPal.

Security Issues of Today

The internet has allowed for mass communication among people, especially with comings of social media. With so many users online, we must learn to protect our self from threats, not everyone on the internet or every website is safe.


  1. BE KIND : say nice things because you never know who will read what you say
  2. BE SAFE : know who you are friending and talking to 
  3. BE SECURE : don’t share personal information with strangers
  4. BE LEGAL : don’t download music or images that you didn’t pay for
  5. BE PROTECTED : don’t share your passwords with anyone 
  6. BE ALERT : tell an adult when a friend is in trouble online 
  7. BE SMART : use positive words to build your online brand
  8. BE RESPONSIBLE : don’t access sites and apps you should not access
  9. BE CONSCIENTIOUS : be truthful, never lie or gossip
  10. BE MODEST : don’t take or share inappropriate pictures on the internet


Social media sefty
  • MODEL USE : When kids are around, set an example by using media the way  you want them to use it.
  • START EARLY: Start when your kids are young by setting screen limits that work for your family’s needs.
  • MINIMIZE DISTRACTIONS: Hide your apps so they don’t display and shut down your devices during family time .
  • USE TOGETHER : Discuss media content with your kids. Be present and aware of what your child is doing online.
  • TURN OFF WORK: Set boundaries for work time and family time 

They’re being distracted form other Important things and their friends:

  • 57% :- of all teens agree that using social media often distracts them when they should be doing homework.
  • 64% :- of teen social media users agree that it often distracts them when they should be paying attention to the people they’re with.
  • 34% :- of teen smartphone owners say they’ve been woken up by their phones during the night by a call, text, or notification.
  • 49% :- of teens agree that social media has taken away form time they could spend with friends in person.

What happens online stays online:

When asked to pick which comes closer to the truth, teens say.

54% – If parents knew what actually happens on social media, they’d be a lot more worried about it.

46% – parents worry too much about teen’s use of social media.


12% –> More time together 

28 % –> less time together 

58%–> No difference

38% –> of children under 2 use a mobile device for media 

17% –> of children use mobile devices on a daily basis

Just 28 minutes a day is spend reading or being Read to.

Among parents who own a mobile device 

26% –> sometimes use media to keep themselves occupied while out playing with their children 

31%–> sometimes let their child play with the device while out running errands


75% =Of all children have access to a mobile device in their home 

63%= use a smartphone 

40%= use  a tablet 

27%= use an iPod touch/similar 



When we pass away, our digital footprint be comes our digital legacy. If you want to control how you’re remembered online, here are 4 tips for taking ownership of your social presence.

  • Assign a Digital Executor = Digital executors can close your social media accounts or keep them live.
  • Memorialize your Facebook Account = Facebook : prefers to convert profile into memorials. Walls remain active for friends to post condolences. Facebook : allows the family to download account contents with prior authorization or a court order.
  • Deactivate your accounts
  • Twitter : works with your estate to deactivate an account. They will not let anyone take over an account unless you get an exception.
  • LinkedIn : closes an account if a close family member makes the request.
  • Instagram : honors family requests to deactivate an account. An heir may keep the account live if the deceased provides them with a username and password .

Live on through social media end -of -life tools 

  • Dead Social : Creates a series of goodbye videos, texts or photo messages on Facebook and twitter that are published at your digital executor’s request.
  • If I Die : Facebook application allows you to creates a single video or text message that is published after you pass. A single message is free $ 25 for five videos.
  • Cirrus legacy : An online service that allows you to securely store your usernames, passwords and instruction that are released to your digital executor upon death.

Social Media While Jobs Searching

  • Go ahead and ego-surf 

Google your name to see if there is anything inappropriate or embarrassing  coming up. Are the first results consistent with how you want to be perceived  as a person?

Clean up your social media dirt

Look closely for anything that could harm your image -don’t just remove embarrassing photos, but look for any controversial comments or posts too.

  • Work on your digital brand

Create a neat, professional and interesting online image that will impress hiring managers and make them want to know more about the offline you.

  • See who can see what

Check your privacy settings and use the ‘view as’ option to see what people who are not connected with you can see. Then adjust accordingly.

Next time you post..

  • Edit privacy settings
  • Make sure the massage is not embarrassing or (highly) controversial
  • Check for any grammar errors and typos

Social Media and Body Images

Boys have issues with body image too.

Boys’ own body concerns and risky behaviors can go unnoticed , and their role in supporting healthy attitudes among girls is vital.

Pay attention to your son, too

  • Listen for negative body talk.
  • Look for dramatic weight loss or fain.
  • Check the messages from coaches, peers, and online forums about weight, exercise , and muscle-building.

Measurements of by toy male action figures exceed even that of the biggest bodybuilders.

 Unrealistic, sexualized, and stereotypical images and messages about bodies and gender are rampant on the media your kid consumes.

Media is influential- If all your child sees are unrealistic body types she’ll come to believe they’re the ideal.

Immunize your child

  • Choose quality  media with diverse characters.
  • Question assumptions about appearance
  • Challenge stereotypes about gender, body types, abilities.

Teens feel pressure to look good and cool online, but also fell social media helps their friendships and connections.

Kids live in constant feedback loop of criticism and connection that moves quickly and is difficult to escape.

 Be  a social media supporter

  • Help teens find supportive online communities.
  • Encourage social media breaks when online drama heats up.
  • Ask teens how online feedback makes them feel

41% of teen girls say they use social media to “ make themselves look cooler”.

Please follow and like us:

WiFi the Silent Killer

According to some studies made by “the telegraph”, exposure to wireless waves interfere with the human body and can create problems such as: Short term memory loss, Lethargy, Cardiac problems, Sleep disturbance.

In previous post we describe about Evolution of 5G Technology

WiFi Radiations

Wireless Internet routers or WiFi modems use dangerous electromagnetic radiation to send their signals to your computer through walls. If you have a wireless internet router set up in your home or office you are receiving massive EMF exposure, and living or working in a dangerous soup of radiation.

Not only atmospheric + ve charges, the wireless WiFi devices + cell phone radiation and the static electricity but also other pollutants.

Reduce your WiFi Radiation

We know that some people can’t quite bring themselves to surrender their wireless devices so here are some tips on reducing Wifi radiation.

  • Keep your distance : WiFi radiation drops off significantly with distance. many routers have a strong enough signal to maintain a connection up to 100m from the router.
  • Switch off at Night : Studies tell us that the biggest danger with WiFi radiation comes from nighttime exposures; cellular regeneration, rejuvenation, and detoxification is impeded and notably melatonin production can be significantly reduced.
  • Use USB Adaptors wisely: If you are use a USB WiFi adapter use it on a USB extension cable. The same goes if you use a 3G USB dongle to connect to the internet wile you are traveling, an extension cable will significantly reduce your exposure.

The dangers of WiFi are real. Use the above tips to eliminate or reduce your exposure to WiFi radiation.

10 Shocking facts about the Health Dangers of WiFi

  1. Contributes to the Development of Insomnia
  2. Damaging to childhood development
  3. Affects cell growth
  4. Derails brain function
  5. Reduces brain activity in females
  6. Neutralizes Sperm
  7. May Impact fertility
  8. Linked to cancer?
  9. Provokes cardiac stress
  10. You can protect yourself limiting exposure and staying healthy

Creating WiFi Monetization

  • Grow WiFi Network : Deploy public, hoe and business WiFi network
  • Baseline : Create compelling ROI through baseline business models
  • New Revenues : Deliver new sources of revenue and expand value of the WiFi network
  • Value Added Services : Enhance the WiFi network with new sources of value

Employee Use of Public WiFi networks

Percent of organizations with employees who connect company owned devices to public WiFi when on the go

  1. Yes –> 61%
  2. No –> 24%
  3. Don’t know –> 15%

Risk to Pregnant Women

There are radiation related risks throughout pregnancy which are related to the stage of pregnancy and absorbed dose and also radiation risks are most significant during organogenesis and in the early fetal period somewhat less in the 2nd trimester and least in the third trimester.

A pregnant woman and the fetus both are vulnerable a RF radiations pass placental barrier and continuously react with the developing embryo and increasing cells. Use of WiFi during pregnancy can lead to greater likelihood for behavioral problems in their children. It is believed that the eggs, which form the embryo can be affected and the damage will become apparent after the child reaches puberty.

Government who Against the use of Wireless networks in School..

  • The European Union is recommending tighter standards for wireless systems to protect children.
  • Frankfurt City Government and the Bavarian Parliament have recommended against the installation of WiFi in schools.
  • The Public Health Department of Salzburg has warned against the use of WiFi in Schools and nurseries.
  • French National Libraries has imposed a moratorium on WiFi networks in French libraries after staff reported ill effects
  • Teachers union voice has said wireless computer networks in schools may be jeopardizing children’s health and should be suspended pending a full safety inquiry.
  • The International Commission for Electromagnetic Safety has advised against the use of wireless networks because of health concerns.
  • The chairman of the health protection agency has expressed concern about the use of wireless networks in schools.

See another post : Social Media

Please follow and like us: