90 likes | 107 Views
Explore key mobile security threats like data leakage, network spoofing, spyware, and phishing attacks. Understand how to protect your device with proper security management and antivirus solutions.
E N D
Security in mobile technologies By Leon Antony
Verizon asks the FCC • The 60 Day policy- as part of an initiative to prevent identity theft and fraud. Verizon asks the Federal Communications Commissions to lock new smartphones for their network for 60 days.
Data Leakage • The unauthorized transmission of data from within an organization to an external destination or recipient. • Mobile apps are often the cause of unintentional data leakage. Known as Riskware Apps
Unsecured Wi-Fi(Basicly Free WIFI) • 1. Capture your account’s user ID and passwords. • 2. Log the data of online traffic accessed on your phone or computer. In this way, they can maintain a data of the websites you mostly visit, and plan attack from these websites. • 3. Gain access to your computer, its network and data. • 4. Launch a spam or malware attack on your device. • 5. Hijack the account you are logged into, and use it for unscrupulous purpose. • 6. Redirect you to a phishing webpage where you might give away your personal information.
Network Spoofing • Setting up fake access points or hotspots in high traffic areas. • Attackers require users to create an “account” to access these free services, complete with a password. Many users employ the same email and password combination for multiple services, allowing the hackers to compromise their email, e-commerce, and other secure information.
Phishing Attacks • The fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy entity in an electronic communication
Spyware • As the name implies, this is software that "spies" on your computer. ... Spyware can capture information like Web browsing habits, e-mail messages, usernames and passwords, and credit card information. If left unchecked, the software can transmit this data to another person's computer over the Internet.
Security Management • Device Protection: Allowing remote data "wiping" if your device is ever lost or stolen • Data Protection: Preventing corporate data from being transferred to personal apps running on the same device or personal network • App-Management Security: Protecting your in-app information from becoming compromised. • Download a Antivirus
Sources • https://www.kaspersky.com/resource-center/threats/top-seven-mobile-security-threats-smart-phones-tablets-and-mobile-internet-devices-what-the-future-has-in-store • https://www.finjanmobile.com/the-dangers-of-using-unsecured-wi-fi/ • https://www.theverge.com/2019/2/22/18236759/verizon-fcc-phone-locking-60-day-fraud-identity-theft-protection • https://www.information-age.com/security-vulnerabilities-mobile-devices-123464616/