Okay, I admit it: I’m a noob. And I fell for one of the oldest tricks in the book.
I received a text from my daughter a while back – you know, one of those chain texts that say “pass this on to ten of your friends” blah, blah, blah…and I did it.
Next thing I know: Unwanted phone calls, strange texts from people I didn’t know, spam in my email, and then I started thinking…
But why? I mean, it’s just a phone, right?
WRONG!
The mini-computer we have come to know as the smart phone can do everything that your laptop or desktop can do, and that means it can also be as vulnerable as any other PC.
Think of all the things that you use your phone for. Smart phones aren’t just for communication anymore. “There’s an app for that” is no longer a catch phrase. It’s a fact of life.
Smart phones are, in fact, miniature computers, plain and simple – and here’s an interesting fact: That simple, rectangular item that you use to talk, text, bank, game, watch movies, etc., contains more processing power than the computers that were used to land a man on the moon!
That’s right kids, that smart phone could control all the systems on the rocket, the lander, and Mission Control, and it fits in the palm of YOUR hand – pretty amazing, right?
Just listen to the advertisements that we see on TV these days. Phrases like “unlimited talk and text”…”ten gigabytes of data to share”, “Access via the Cloud”, and it all sounds really cool. Now think of it this way:
“Ten gigabytes of data to share.”
You are transmitting data, perhaps personal data, across a network just like you do on your computer at home.
“Synch your personal media and enjoy it from any device.”
You are accessing and sharing your personal media over a wireless network, just like you would on your computer at home.
“Synch contacts so you can easily respond to customer needs in the field.”
You are connecting your email credentials and contacts to your phone, over a wireless network, so you can use your phone like you use a laptop, tablet, or desktop.
“Use your smart device to access your home or auto”
Smart homes and smart cars now communicate with smart phones, just in case you leave the lights on/off, or lock your keys in your car. No lie: I have a friend with a car that will unlock if she accesses its computer via an app on her phone! She can even start the car remotely with it!
“Provides the best personal security for your smartphone and other mobile devices”
You should be frowning right now, because I just made that up...
How many advertisements have you heard talking about the security of your smart phone or mobile devices? In point of fact, I haven’t seen much until recently.
There’s a saying: “A chain is only as strong as its weakest link.”
In the world of networking, that smart phone can be the weakest link in your security chain.
Here are some of the more common security issues faced by smart phone operating systems and the risks to their owners:
Vulnerability #1: Hacking the old phone – when you upgrade, make sure the vendor properly decommissions your old phone. One recent study of second hand phones sold on eBay, allowed researchers to back trace some of the previous owners, allowing them to recall the call history, contacts, and passwords of those individuals.
Solution: Make sure you dispose of or recycle your old phone properly.
Vulnerability #2: Phishing – This is the one that I fell for at the top of the article. This can be a simple chain text or even an unverified app that allows a third party to track or retrieve personal information from your phone in the same way they would do so on your personal PC. Because awareness of smart phone vulnerability is relatively low, hackers are banking on users not knowing they can be compromised.
Solution: Be aware! Form texts can have more attached to them than just a “Blessing from Angels”. Don’t forward chain texts or messages. Make sure the apps you load onto your phone have been certified as secure. Don’t purchase or download apps from untrusted vendors.
Vulnerability #3: Spyware – With the advances in technology, spyware has entered a whole new arena in the smart phone universe – so much so, that they can actually utilize the GPS applications, microphone, and web browsing habits to track your activity in cyberspace AND in the real world. It can be hidden in service apps that request access to your personal data – and we've all seen how many apps want access to your personal location and data in order to function.
Solution – If you don’t need it, don’t download it. If you do need it, (or think you will), then download it and refuse to allow it to access your personal information, and then see how it functions. If it functions normally, you have a couple of choices: You can use the app, and deny it access to personal information, or you can remove it, because if it NEEDS that information to function, and yet functions without it, well…?
Vulnerability #4: Network Spoofing – Your Galaxy S5 has WiFi capablility and will automatically connect to available WiFi networks when they are detected, which is awesome! You have wireless networks at Starbucks. You have wireless networks at the local library. You have a wireless network in your own home. And Mr. Disreputable has a wireless network broadcasting from his 1978 Pontiac just HOPING you’ll connect as he coasts by your home so he can monitor your activity, (a process called data mining), and get some personal information.
Solution – Make sure your personal networks are secure and be sure to change the network password when installing new routers or Wi-Fi transmitters. Be sure your device only connects to networks YOU want it too.
Vulnerability #5: Surveillance attacks – This one is personal. Someone is actually targeting the specific user THROUGH their smart phone. This can be done a number of ways, and essentially turns your smart phone into a tracking device. The hacker then accesses personal data, or the smart phone’s camera and/or mic to monitor the victim.
Solution – watch for unusual activity on your phone. A flicker from the screen, blinking indicator light, or rapid battery drain can all be signs that something is amiss.
Finally, just as you would with your desktop or laptop, having a good security application is always beneficial. Many companies are now offering mobile security applications that do for your smart phone what anti-virus suites do for your PC. While there are several applications on the market, I am a firm believer in the principle of, “Why pay for something when you don’t have to?”
So, in wrapping up this article, I would like to give a blatant plug for the Avast Mobile Security application, available on the Google Play Store and (I believe) Apple’s store as well. While I have not tested the application on an iPhone, I have used this application on my Android device for a couple of years now and it has performed superbly.
As with everything else, if you’re unsure how to proceed, always consult a professional for service and/or advice on securing your mobile device.
And remember: Just because we don’t treat a device like a PC, doesn’t mean it isn’t one.
Got a question or comment, feel free to use the "Contact" tab. We'd love to hear from you!
I received a text from my daughter a while back – you know, one of those chain texts that say “pass this on to ten of your friends” blah, blah, blah…and I did it.
Next thing I know: Unwanted phone calls, strange texts from people I didn’t know, spam in my email, and then I started thinking…
But why? I mean, it’s just a phone, right?
WRONG!
The mini-computer we have come to know as the smart phone can do everything that your laptop or desktop can do, and that means it can also be as vulnerable as any other PC.
Think of all the things that you use your phone for. Smart phones aren’t just for communication anymore. “There’s an app for that” is no longer a catch phrase. It’s a fact of life.
Smart phones are, in fact, miniature computers, plain and simple – and here’s an interesting fact: That simple, rectangular item that you use to talk, text, bank, game, watch movies, etc., contains more processing power than the computers that were used to land a man on the moon!
That’s right kids, that smart phone could control all the systems on the rocket, the lander, and Mission Control, and it fits in the palm of YOUR hand – pretty amazing, right?
Just listen to the advertisements that we see on TV these days. Phrases like “unlimited talk and text”…”ten gigabytes of data to share”, “Access via the Cloud”, and it all sounds really cool. Now think of it this way:
“Ten gigabytes of data to share.”
You are transmitting data, perhaps personal data, across a network just like you do on your computer at home.
“Synch your personal media and enjoy it from any device.”
You are accessing and sharing your personal media over a wireless network, just like you would on your computer at home.
“Synch contacts so you can easily respond to customer needs in the field.”
You are connecting your email credentials and contacts to your phone, over a wireless network, so you can use your phone like you use a laptop, tablet, or desktop.
“Use your smart device to access your home or auto”
Smart homes and smart cars now communicate with smart phones, just in case you leave the lights on/off, or lock your keys in your car. No lie: I have a friend with a car that will unlock if she accesses its computer via an app on her phone! She can even start the car remotely with it!
“Provides the best personal security for your smartphone and other mobile devices”
You should be frowning right now, because I just made that up...
How many advertisements have you heard talking about the security of your smart phone or mobile devices? In point of fact, I haven’t seen much until recently.
There’s a saying: “A chain is only as strong as its weakest link.”
In the world of networking, that smart phone can be the weakest link in your security chain.
Here are some of the more common security issues faced by smart phone operating systems and the risks to their owners:
Vulnerability #1: Hacking the old phone – when you upgrade, make sure the vendor properly decommissions your old phone. One recent study of second hand phones sold on eBay, allowed researchers to back trace some of the previous owners, allowing them to recall the call history, contacts, and passwords of those individuals.
Solution: Make sure you dispose of or recycle your old phone properly.
Vulnerability #2: Phishing – This is the one that I fell for at the top of the article. This can be a simple chain text or even an unverified app that allows a third party to track or retrieve personal information from your phone in the same way they would do so on your personal PC. Because awareness of smart phone vulnerability is relatively low, hackers are banking on users not knowing they can be compromised.
Solution: Be aware! Form texts can have more attached to them than just a “Blessing from Angels”. Don’t forward chain texts or messages. Make sure the apps you load onto your phone have been certified as secure. Don’t purchase or download apps from untrusted vendors.
Vulnerability #3: Spyware – With the advances in technology, spyware has entered a whole new arena in the smart phone universe – so much so, that they can actually utilize the GPS applications, microphone, and web browsing habits to track your activity in cyberspace AND in the real world. It can be hidden in service apps that request access to your personal data – and we've all seen how many apps want access to your personal location and data in order to function.
Solution – If you don’t need it, don’t download it. If you do need it, (or think you will), then download it and refuse to allow it to access your personal information, and then see how it functions. If it functions normally, you have a couple of choices: You can use the app, and deny it access to personal information, or you can remove it, because if it NEEDS that information to function, and yet functions without it, well…?
Vulnerability #4: Network Spoofing – Your Galaxy S5 has WiFi capablility and will automatically connect to available WiFi networks when they are detected, which is awesome! You have wireless networks at Starbucks. You have wireless networks at the local library. You have a wireless network in your own home. And Mr. Disreputable has a wireless network broadcasting from his 1978 Pontiac just HOPING you’ll connect as he coasts by your home so he can monitor your activity, (a process called data mining), and get some personal information.
Solution – Make sure your personal networks are secure and be sure to change the network password when installing new routers or Wi-Fi transmitters. Be sure your device only connects to networks YOU want it too.
Vulnerability #5: Surveillance attacks – This one is personal. Someone is actually targeting the specific user THROUGH their smart phone. This can be done a number of ways, and essentially turns your smart phone into a tracking device. The hacker then accesses personal data, or the smart phone’s camera and/or mic to monitor the victim.
Solution – watch for unusual activity on your phone. A flicker from the screen, blinking indicator light, or rapid battery drain can all be signs that something is amiss.
Finally, just as you would with your desktop or laptop, having a good security application is always beneficial. Many companies are now offering mobile security applications that do for your smart phone what anti-virus suites do for your PC. While there are several applications on the market, I am a firm believer in the principle of, “Why pay for something when you don’t have to?”
So, in wrapping up this article, I would like to give a blatant plug for the Avast Mobile Security application, available on the Google Play Store and (I believe) Apple’s store as well. While I have not tested the application on an iPhone, I have used this application on my Android device for a couple of years now and it has performed superbly.
As with everything else, if you’re unsure how to proceed, always consult a professional for service and/or advice on securing your mobile device.
And remember: Just because we don’t treat a device like a PC, doesn’t mean it isn’t one.
Got a question or comment, feel free to use the "Contact" tab. We'd love to hear from you!