Mobile Security

Mobile security
Protect yourself from thieves. Use strong passwords and encrypt your mobile device. Stay safe from targeted attacks and use good security option

Mobile security is the protection of smart phones, tablets, laptops and other portable computing devices and the networks they connect to from threats and vulnerabilities associated with wireless computing Mobiles security is also known as wireless security.

What is Mobile Security

Today’s large companies each spend an average of $40 million annually to develop mobile apps we use to shop, bank, departmental store and more.

However, only an average of 7% of this immense budget is spent on securing these apps against hackers and security breaches. 50% of companies have zero budget dedicated to securing their mobile apps.

How Secure are your Mobile apps?

  • 75% Don’t use proper encryption when storing data on a mobile device.
  • 98% Have access to private data without appropriate security measures.
  • 78% Mobile security breaches will be the result of exploiting poorly developed mobile apps.

Types of Mobile Malware

A study showed 8 out of 10 malware instances were worms spready by USB Removable devices.

MCAffe antivirus found that 10% of mobile devices are infected more than 400 new threats every minute.

  • Adware = Spyware that collects information about the user to relay to a third party for purchasing patterns. Usually disguised as a legitimate app.
  • Bots= Applications that can run in background undetected. Can be quite sophisticated and adaptable May have capability to contact botmasters to execute commands.
  • Trojans= Varying effects that can be mildly annoying or completely destructive. Usually are hidden and attached to applications that seem harmless. Ransomware is typically a member of this family of mobile malware. Can be quite sophisticated and adaptable
  • Phishing= Website that are set up to entice users to enter, then steal credentials and personal information.
  • Spyware= Monitors, logs, and shares information with remote servers on personal activity, text messages, e-mails, voice recordings, phone calls, contact lists, location, pictures, status etc.

The Ricks Behind the Apps

Malicious Behaviors

  • Accesses device management and restricted security ApIs necessarily
  • Accesses or requests super user permission
  • Exploits operating system or zero-day vulnerabilities
  • Roots or jailbreaks device
  • Steals login credentials
  • Communicates with known malicious IP addresses and domains

Moderate Risk Behaviors

  • May be a risk if performed by apps from unknown or untrusted sources
  • Reads and Sends e-mails
  • Read and sends SMS messages
  • Reads and sends GPS information

Dangerous Behaviors

  • Uploads user information without permission or without notifying user
  • Includes SSL vulnerabilities that enable communications to be intercepted
  • No privacy policy or refers to an invalid privacy policy
  • Installs boot time startup item

Mobile Security in the world statistics

  • More than 69% of adults have had a mobile devices stolen or lost
  • Yet 9/10 of people don’t use mobile security applications that could help them protect data when someone else has the device.
  • 89% of those surveyed do not back up their phone data
  • 78% of those surveyed do not use a screen lock or password to access their device
  • Although 83% of us are aware of the increased security risk of public WiFi, 76% still connect to public networks

Mobility is changing the way we live and work

  • Internet connected mobile devices are set to outnumber human
  • 82% of employees store sensitive company data on mobile devices
  • 89% of tablets used by mobile workers are personally owned
  • Mobile works now carry on average 3 devices Laptop, Mobile and Tablet
  • 63% of people check their mobile phone in the morning before getting up
  • Half of the devices on corporate networks will be mobile devices by 2019

Which types of applications or systems present the highest security risk to your business?

  • Customer facing web apps = 33%
  • Mobile apps = 25%
  • Desktop apps = 12%
  • Embedded systems = 21%
  • internally facing web apps = 9%

Ways to Block Mobile Attack

Don’t let your guard down just because you’re on a mobile device. Be just as careful as you would on a desktop!

  • WiFi
    . Don’t allow your device to auto-join unfamiliar networks
    . Always turn off WiFi when you are’nt using it or don’t need it
    . Never send sensitive information over WiFi unless you’re absolutely sure it’s secure networks
  • Apps
    . Only use apps available in your device’s official store – Never download from a browser.
    . Be wary of apps from unknown developers or those with limited/ bad reviews.
    . Keep them updated to ensure they have the latest security.
    . If they are no longer supported by your store, just delete it.
    . Don’t grant administrator, or excessive privileges to apps unless you truly trust them.
  • Browser
    . Watch out for ads, giveways and contests that seem too good to be true. Often these lead to phishing sites that appear to be legit.
    . Pay close attention to URLs. these are harder to verify on mobile screens but it’s worth the effort.
    . Never save your login information when you’re using a web browser.
Please follow and like us:

10 thoughts on “Mobile Security”

  1. I would also like to state that most people who find themselves devoid of health insurance are typically students, self-employed and those that are without a job. More than half of those uninsured are under the age of 35. They do not really feel they are needing health insurance since they’re young as well as healthy. Their particular income is usually spent on property, food, along with entertainment. Many people that do work either entire or part-time are not offered insurance through their work so they get along without due to rising expense of health insurance in the United States. Thanks for the concepts you discuss through this site.

  2. Thanks for the strategies you are giving on this blog site. Another thing I want to say is getting hold of duplicates of your credit history in order to examine accuracy of the detail is one first action you have to conduct in credit repair. You are looking to clear your credit file from destructive details flaws that mess up your credit score.

  3. I discovered your blog site on google and verify a number of of your early posts. Proceed to keep up the excellent operate. I just further up your RSS feed to my MSN News Reader. Seeking forward to reading extra from you later on!…

  4. I’m sorry for off-topic, I am considering about making an interesting web-site for students. Will possibly begin with posting interesting facts just like”A B-25 bomber crashed into the 79th floor of the Empire State Building on July 28, 1945.”Please let me know if you know where I can find some related facts such as right here

    analysis essay

Leave a Reply