Uploaded on

Do you use your smartphone? How often do you take steps to project the information which is stored inside. Be as smart as your phone!

Do you use your smartphone? How often do you take steps to project the information which is stored inside. Be as smart as your phone!

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
293
On Slideshare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
12
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Be As Smart As Your Phone: Protect Your Phone Katie Kalk Tricia Jose Paul Chiang
  • 2. Wi-Fi Networks Free ≠ safe Hacker tactics: – Man In the Middle Attack – Evil Twin Attack Strategies: – Know your networks/use password protected networks – Use HTTPS when available – Run Firewall/antivirus program – Do not use public Wi-Fi for sensitive material
  • 3. Wi-Fi Networks Free ≠ safe Hacker tactics: – Man In the Middle Attack – Evil Twin Attack Strategies: – Know your networks/use password protected networks – Use HTTPS when available – Run Firewall/antivirus program – Do not use public Wi-Fi for sensitive material
  • 4. Public banking on your phone Andrew Hoog is the co-founder of a company called viaForensics, which recently tested six of the most popular banking apps for potential weaknesses. Only one app passed the test. Some, like Wells Fargos Android app, stored critical information on the phone in plain text. …so now what? Strategies?
  • 5. Smishing
  • 6. Malicious applications “nearly one in five mobile phone users have experienced some type of security threat with their device.” - USA Today 3069 malicious Android application package files have been detected in the first 3 month period of 2012 - F-Secure’s 2012 Mobile Threat Report
  • 7. Malicious applications Download = access Strategies: – Stay official (App Store/Google Play) – Check references/read reviews – Think about permissions
  • 8. Geotagging What is it? – GPS coordinates linked onto pictures, social media, messages, etc “Checking in” So what? – Who can see my location? How can they see my location?
  • 9. Geotagging How to disable: – iPhone: • Settings > General > Location Services > Disable – Blackberry: • Menu > Options > Disabled > Save – Android: • Menu > Settings > Geotagging/Location Storage > Off
  • 10. What’s your digital tattoo?