Security On Mobile Devices

Hello reader,

Even as you read this someone’s phone credentials are being used to access their phone or tablet. It isn’t that mobile devices are inherently less safe, but they are used in a manner that leaves them far more vulnerable than laptops. A few reasons why include:

Email Phishing

The trouble starts with attachments that a PC has some defense against, but a mobile device does not. That doesn’t need to be the case but the resource heavy security programs for mobiles are unpopular leaving the phones and tablets much more likely to be subjected to this threat.

Wardriving

Much as a router can be repurposed to attack a network, a phone can carry out such attacks unbeknownst to the user. If anything this makes the risk two fold as the person carrying the phone may be held liable for any resulting infection in some cases.

Unencrypted Wireless Networks

This is a privacy concern for users who may not realize that their online activity could be potentially monitored by the user across the room. This is also a common exploit tactic in hotels and coffeeshops.

Apps With Deep Permissions

Your standard flashlight app shouldn’t need to know your email, home address, phone contacts, banking numbers, or any other relevant information. That doesn’t stop 3 out of 4 users from downloading at least a few apps with questionable permissions.

While there are ways of increasing or decreasing the likelihood of a phone or tablet being attacked, there are as of yet no ways to completely eliminate the risks and retain the full user experience. Until there is it’s simply best to be wary and not jog around the city with hotspot turned on.

 

Spread the love

161 thoughts on “Security On Mobile Devices”

  1. I do accept as true with all the concepts you’ve introduced in your post. They’re really convincing and can definitely work. Still, the posts are too short for newbies. May you please extend them a bit from next time? Thanks for the post.

  2. Hey very nice website!! Guy .. Beautiful .. Superb .. I’ll bookmark your blog and take the feeds also…I am happy to seek out numerous useful information here within the put up, we’d like work out more techniques in this regard, thank you for sharing.

    http://lv.uribombu.info

  3. Very good post. I absolutely like your site. Stick with it!

    http://firstlime.com/z-star-manual-portable-wheatgrass-juicer-review/

  4. This is really interesting, You’re a very skilled blogger. I have joined your rss feed and look forward to seeking more of your excellent post. Also, I’ve shared your web site in my social networks!

  5. I appreciate a lot for your precious time in writing this article.

    http://www.noaanews.noaa.gov/exit.html?http://thegoldinvestment.com/

  6. I have been checking out a few of your stories and i can state pretty clever stuff. I will definitely bookmark your site.

  7. I just could not depart your site before suggesting that I extremely loved the usual info a person provide on your visitors? Is gonna be again regularly in order to check out new posts

  8. I am very happy to read this. This is the type of manual that needs to be given and not the random misinformation that’s at the other blogs. Appreciate your sharing this best doc.

  9. Thank you so much for your precious time in writing this blogpost.

    http://www.popscreen.com/v/9yWrY/How-to-properly-invest-in-Gold-IRA-Rollover#mainContent

  10. I thank you a lot for your precious time in writing this article.

    https://www.facebook.com/writingjobincome

Leave a Reply

Your email address will not be published. Required fields are marked *