The Smart-Phone Industry - Software: Mobile Security Essentials: Your Mobile Phone Is a Serious Computer That Must Be Secured PDF Print E-mail

There's no doubt about it - mobile devices have become man's new best friend. If you don't believe it, consider that there are currently over 4 billion mobile phones in use worldwide among 7 billion people, not to mention millions of tablets. People use their devices to stay in touch, take pictures, shop, bank, listen to music, and socialize. Additionally, they store personal and professional information on them, and because they use them for almost everything, they have both a high financial and emotional value.

Losing your smartphone or tablet, or the information on it, can be a hassle. If you lose your mobile device, you not only have to replace it, but you could also lose the sensitive information you had stored on it, including account numbers and confidential work information. So, why do so many of people leave their mobile devices unprotected?

Though most people do recognise the need to protect their computers from a myriad of digital threats, many don't realize that they face the same threats, as well as a host of new ones, with mobile devices. In fact, most mobile users don't even know that there is security software for mobile phones, even though it has become increasingly essential.

For one thing, the growing popularity of mobile devices has led cybercriminals to see them as a new avenue for attack. Mobile malware has grown significantly in recent years, becoming ever-more sophisticated and dangerous as it spreads. Furthermore, cybercriminals are not just designing malware for mobile, they are also taking advantage of the way you use these devices to trick you into opening risky emails and web pages, or accidentally downloading a malicious file.

So, as a mobile user, keep in mind that you need to learn how to how to protect yourself from a variety of threats. Some of the essentials for your mobile protection include: locking your device with a PIN number password that only you know, only installing applications from trusted sources, backing up your data, keeping your mobile software updated, remembering to log out of bank and shopping sites and making good use of Antivirus software.

It's also important to avoid sending personal information such as bank details or passwords via email, as such valuable information can be easily hacked by cybercriminals. It's also a good idea to turn off Wi-Fi, location services and Bluetooth when you are not using them. This will limit the chances of your important information being leaked in a shared digital environment.

Your Mobile Phone Is a Serious Computer That Must Be Secured

Mobile devices have forced a radical shift in the way human beings deal with their day-to-day activities and how organizations service their customers. Earlier there was a clear distinction between internet, the intranet and internal corporate network. But today with miniature yet powerful mobile devices carrying data, sending e-mails, social networking, banking, gamming, downloading music and video, the situation is more like scrambled eggs.

In a June 2010 report on Internet trends, Morgan Stanley predicted that by 2012 the number of smartphones shipped will exceed the total number of desktop and notebook PCs. Compact and relatively inexpensive, these devices can be used for many functions, including sending and receiving electronic mail, storing documents, delivering presentations and remotely accessing data.

Even before the advent of smartphones, malicious software and viruses were already a recognized threat to mobile devices. As of 2009, applications allowing users to view and manipulate financial accounts, auction listings, and shopping accounts linked to credit cards are becoming commonplace. Whether simple rogue text messages, fictitious billing scams or more malicious attacks using malware installed on the device, the number of attacks are increasing at an alarming rate-mobile malware increased by more than 45 percent in 2010. With less education about mobile threats and the lack of security on these devices, users seem more inclined to fall victim to them during mobile sessions.

In June 2010, a developer hacked around 400 iTunes accounts. At the end of July, 4.6 million Android users had downloaded a suspicious app that transmits data to a site in China. In the mad haste to market the products and offer increased functionality, neither mobile devices, corresponding software nor applications are designed with security as a priority.

As a result there are increasing problems from applications that upload malware or exploit vulnerabilities in new operating systems, either inadvertently or deliberately. This opens opportunities for cyber criminals to use apps to install a backdoor on such devices to use it for a range of purposes, such as sending spam or recording keystrokes to steal bank details.

Sophisticated cybercrime groups have emerged as online fraud leaders deploying malware for phishing, smishing and spear-phishing attacks. The execution is what is known as a "man-in-the-browser" attack. The man-in-the-browser (MITB) attack leverages a Trojan Horse (or simply a Trojan) - malicious software that is somehow installed-often initiated by various social engineering tactics-and resides concealed on the user's device. It wakes up when the user visits a target site, and functions by simply capturing and modifying information as it filters communication between the browser's user interface and the Internet. These attacks usually result in a loss of funds for the end-user or business, and a loss of credibility for the victim institutions.

Mobile devices are particularly susceptible to attack for a number of reasons:

The distribution of applications to the devices, via third-party app stores, makes them susceptible to the distribution of malware. And there are no application certification rules.

Users regularly check e-mail on mobile devices and the current limitations of mobile browsers make it more difficult to identify fraudulent messages and sites. This increases the risk of clicking on or being duped by fraudulent messages. The tendency for quick communication and instant response reinforces the risk.

There are no e-mail forwarding restrictions.

There are no default browser permission rules.

In the mobile scenario expectation for prompt, unobtrusive communication, creating a culture for mobile security is essential. A few ways of enhance mobile security would be:

  • Using effective passwords that are changed regularly.
  • Using a powerful AntiVirus and AntiSpyware program and updating it regularly.
  • Having back-ups of all important data and encrypting sensitive data.
  • Having an emergency response plan for mobile and wireless security breaches.
  • Blending proactive education with appropriate technology that protects network, mobile and wireless connections.

With mobile security turning out to be the elephant in the room, end-user security and strong authentication needs to be simple, quick and transparent.

 

Antivirus Software Articles

Internet Security Software Articles

Total Smartphone Security Software Articles