1 / 15

How Safe Are Smart Phones?

How Safe Are Smart Phones?. By Sean Breslin. Can We Trust Our Phones?. Our cell phone, for most of us, is always by our side If it is always with us, does that mean it deserves our trust?

vivi
Download Presentation

How Safe Are Smart Phones?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. How Safe Are Smart Phones? By Sean Breslin

  2. Can We Trust Our Phones? • Our cell phone, for most of us, is always by our side • If it is always with us, does that mean it deserves our trust? • We shouldn’t trust such a device no matter how often we may need it. We now need to take preemptive strikes in order to defend ourselves from our phones.

  3. Smart Phone (Mobile) Operating Systems • Apple • iOS 6 and 7 • Android • Jellybean • Microsoft • Windows MOS

  4. Process To Publish an App

  5. Apple • Apple only lets you download applications and content that has been preapproved • Content from online can’t be downloaded • Apps found online can’t be downloaded

  6. Android • Android allows any video, link, app, or program to be downloaded • Unidentified developers applications will download without a hassle • This allows for anyone to make a potentially harmful application

  7. Mobile App Hacking • This is a fairly uncommon style of hacking but it is highly effective and when done right can access an unbelievable amount of information • This process is done by a developer making a bogus app that the user thinks is a game or utility, when really it is a gateway for a hacker

  8. App Hacking continued • Once a user has downloaded an app, the developer now has full access to you phone • This doesn’t just mean they have access to your phone, this means they can also remotely control it • This is easy to do on android because you can download almost anything to an android device, where an apple has to many checks for faulty applications to be downloadable

  9. Most Common Style Of Cell Hacking • The most common form of cellular phone hacking is data transfer interception • This is where a hacker intercepts all outgoing and incoming calls, texts, and even data from browsing • This Process is most commonly completed with a femtocell

  10. Femtocell • A femtocell is a wireless network extender • Can be bought at best buy or online for $100-$300 • The wireless network extender is compromised and turned into a controllable cell phone tower • Once compromised, it allows the hacker to view any information going in and out of the tower

  11. Video • http://www.youtube.com/watch?v=v-l51HFaUm4

  12. How to fight back • To best fight off an attack, a user should download mobile security software • The mobile software can be incorporated into your settings but more often is an application on your phone

  13. Most Common Security Applications • 1. McAfee Mobile Security 2.0 • 2. Bitdefender • 3. F-Secure Mobile Security 7.6 • These apps will scan pages and browsers to detect any potentially harmful links or pages

  14. Conclusion • Be careful of what you put in your phone • Almost always assume that you aren't the only one viewing these messages or calls • If it seems shady, It probably is for a good reason

  15. What did we learn? • It is better to spend a small amount on mobile security software now, than to spend thousands trying to get vital information back

More Related