SlideShare a Scribd company logo
1 of 1
Download to read offline
The Truth About Smartphone Security
Smartphone
Smartphones users, especially the iPhone, can easily connect to the internet anywhere they go. With the
device’s built-in WiFi connection and easy access to the 3G network, reading emails, accessing financial
websites, and logging into websites over the internet has gotten a lot simpler. -iOs
App
However, there is a strong basis of concern for individuals who enter sensitive sites such as banks and
financial institutions with their mobile phones or tablets. The data sent through these channels are
rarely encrypted and all your login details may be visible to individuals using the Wire Shark program.
Wire Shark is a free app that can read the data sent over public connections like WiFi hotspots. Your
user name and password are exposed to the users of this program. - Android
Internet encryption
Even if you install the best anti-virus program on your mobile phone, the security and safety of your data
is still not assured. Acutest Ltd embarked on a data privacy test and commissioned MTI for the task. MTI
organized the group test and used several mobile security products currently available to determine
whether they can provide that layer of security needed to shield user names and passwords.
All of the popular software failed but one. The only product that successfully encrypted the data being
transferred from a mobile device and into the hotspot and vice versa is DataGard, a product created by
OC Shield. - data encryption
man in the middle - When installed, DataGard successfully encrypts the data transmitted by the smart
phone so it can’t be read by a third party software like Wire Shark. The test group even tried to
compromise the encryption used but none of them were successful. DataGard works by creating a VPN
Tunnel where the encrypted data passes through. As such, there is no way for the communication to be
read or intercepted due to the 256 bit military grade encryption. The software also utilizes a certain data
compression technique to lower bandwidth requirements, which is normally increased when encryption
is used.
vpn
data savings

More Related Content

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

The truth about_smartphone_security

  • 1. The Truth About Smartphone Security Smartphone Smartphones users, especially the iPhone, can easily connect to the internet anywhere they go. With the device’s built-in WiFi connection and easy access to the 3G network, reading emails, accessing financial websites, and logging into websites over the internet has gotten a lot simpler. -iOs App However, there is a strong basis of concern for individuals who enter sensitive sites such as banks and financial institutions with their mobile phones or tablets. The data sent through these channels are rarely encrypted and all your login details may be visible to individuals using the Wire Shark program. Wire Shark is a free app that can read the data sent over public connections like WiFi hotspots. Your user name and password are exposed to the users of this program. - Android Internet encryption Even if you install the best anti-virus program on your mobile phone, the security and safety of your data is still not assured. Acutest Ltd embarked on a data privacy test and commissioned MTI for the task. MTI organized the group test and used several mobile security products currently available to determine whether they can provide that layer of security needed to shield user names and passwords. All of the popular software failed but one. The only product that successfully encrypted the data being transferred from a mobile device and into the hotspot and vice versa is DataGard, a product created by OC Shield. - data encryption man in the middle - When installed, DataGard successfully encrypts the data transmitted by the smart phone so it can’t be read by a third party software like Wire Shark. The test group even tried to compromise the encryption used but none of them were successful. DataGard works by creating a VPN Tunnel where the encrypted data passes through. As such, there is no way for the communication to be read or intercepted due to the 256 bit military grade encryption. The software also utilizes a certain data compression technique to lower bandwidth requirements, which is normally increased when encryption is used. vpn data savings