Practically everyone owns a mobile phone and Cisco foresees more mobile devices than the population of the world before the end of the year. It is also expected that the number of mobile phones around the world will reach 5.2 billion, which is higher than the 4.3 billion units in 2012.
The world has changed ever since the first cell phone was introduced by Motorola in 1973. The latest models are smooth, light, and have similar features as PCs or laptops. The features of current models of smartphones are not limited to communication since they are also used as cameras, multi-media players, internet browsers, and mobile workplaces. Ecommerce and mobile banking are starting to become popular as the number of people using mobile browsers in accessing the internet has increased. StatCounter revealed that there are already more people accessing the internet through mobile browsers than people using their PCs.
Refrain from using public wireless networks in connecting to the internet.
When you browse the net through unsecured wireless networks in public areas like hotels, airports, and coffee shops may leave the private information, contact list, text messages, login information and emails in your mobile device open to illegal access.
Be Cautious of Smishing and Phishing Attacks
PC and laptop users were initially the target of phishing scams. However, with the increasing popularity of mobile browsing, these scams have shifted their sights on mobile devices. Emails and text messages are sent by phishers to obtain passwords, private data, and credit card information from users. Be vigilant of anyone asking for personal information and make it a habit to confirm the address bar to make sure you are on the correct website. It is also important to take note that URLs starting with “https://” are considered as the safest websites. HTTPS is an HTTP protocol where SSL/TLS algorithms encrypt transactions made on a website.
Make sure you do not inadvertently download malware into your mobile device.
Cybercriminals have profited from the use of mobile malware. It is possible for you to download viruses or malware into your mobile device if you download applications, transfer files through Bluetooth or open text attachments found in email messages.
As the practice of BYOD (bring your own device) increases its popularity, it will pose a big problem in the security and privacy of companies and employees if these personal mobile devices that are brought into the workplace contain malware. Developers of malware have started to create applications that obtain log-in names and passwords in their effort to access confidential data in companies. Since conventional security protocols are ineffective, the company should create a strong BYOD policy that will prevent unlawful access to the network of the company.
Mobile malware is an application created by cybercriminals to illegally obtain private information. It is also designed to access illegally or cause a systems failure in a mobile device.
A virus is a software application designed to access mobile devices that feature wireless connectivity. The file would immediately replicate itself and spread when it is opened. It will illegally obtain or delete information stored in a mobile device.
The popularity of the Android mobile OS among customers is due to its wide array of features and capabilities. Due to this success, an increasing number of malware apps have started to target smartphones that use this mobile operating system. Research has revealed that the Android OS is the most unsecured mobile OS in the market. An article from CNN indicates that 97 percent of all mobile device malware are targeted against Android-powered devices. A Bit9 report also shows that more than 100,000 of 400,000 apps that were evaluated on Google Play may be a security hazard. The seamless integration of Android with Google apps, its VPN security, and Mobile Device Management app compatibility has allowed the mobile OS to increase its acceptance among businesses.
Increasing tablet sales has allowed the iOS of Apple to become more acceptable among companies. Since Apple controls the App Store, the iOS of Apple is considered to provide more security than other types of mobile operating systems. But, a recent SourceFire study revealed that the popularity of Apple has resulted to the increasing vulnerability of the iOS. Hackers are also seeing the controlled app store of Apple as a challenge for them to overcome.
Post by Katrin Deres. Marketing manager at www.handyuberwachung.de, loves blogging and writing about cutting-edge apps and cell phone tracking software.