SlideShare a Scribd company logo
1 of 6
Cyber Security
Mobile Devices
SSGT Feliciano
Cyber Surety
Evolution
Risks
Symptoms of
being Hacked!!
Countermeasures
"If a bad guy (black hat hacker) has
unrestricted access to your device, it
is no longer your device! 
Digital Revolution of Mobile Devices
• Network of humans, machines, and
Internet of Things (IoT)
• Desktop Era
Millions
• Cellphone Era
200 Million – Past
• Internet of Things Era (IoT) (Network)
10 Billion - Present
• Internet of Everything Era (IoE) (Global)
50 Billion - Future
Risks
Loss of Personal Information
No inherent Firewall, Anti-virus,
or Encryption
Unregulated Apps + Unlocked
Phones
Mobility = Increased Exposure
App & Web-based Attacks
• Difficult to determine
• Slow performance, decreased functions
• Random actions by the phone
• Phone logs calls you never made
• Photos, documents, and files are added/deleted without
user interactions
Symptoms of being hacked ….
• Feel your phone & battery (excessively hot)
• Check if phone lights up all by itself when not in used
Countermeasures
• Do not root or jailbreak
phone
• Be selective and research app
• Device lock & encryption
• Mobile Anti-Virus
• Failed log-in auto wipe (iPhone)
• No PII inside phone (backup & delete)
• Limit exposure to Wi-Fi
• Log-out completely from web browsers

More Related Content

What's hot

What's hot (19)

Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
 
Safety and security of data student work
Safety and security of data student workSafety and security of data student work
Safety and security of data student work
 
The History of Hacking in 5minutes (for dummie)
The History of Hacking in 5minutes (for dummie)The History of Hacking in 5minutes (for dummie)
The History of Hacking in 5minutes (for dummie)
 
Mobile phone Data Hacking
Mobile phone Data HackingMobile phone Data Hacking
Mobile phone Data Hacking
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
FBI–Apple encryption dispute
FBI–Apple encryption disputeFBI–Apple encryption dispute
FBI–Apple encryption dispute
 
Chp 9 lect - computer crimes surveys (shared)
Chp 9   lect  - computer crimes surveys (shared)Chp 9   lect  - computer crimes surveys (shared)
Chp 9 lect - computer crimes surveys (shared)
 
Apple vs. FBI
Apple vs. FBIApple vs. FBI
Apple vs. FBI
 
Mobile Practice Management
Mobile Practice ManagementMobile Practice Management
Mobile Practice Management
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in Technology
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
Wi fi quiz
Wi fi quizWi fi quiz
Wi fi quiz
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
 
Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethics
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

Similar to 6. mobile security (cyber awareness series)

逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
HITCON GIRLS
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
Mehedi Hasan
 

Similar to 6. mobile security (cyber awareness series) (20)

This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentThis Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is Different
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
 
Privacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsPrivacy and Security in the Internet of Things
Privacy and Security in the Internet of Things
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital Footprint
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS Devices
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 
Smartphone security
Smartphone securitySmartphone security
Smartphone security
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
Hack one iot device, break them all!
Hack one iot device, break them all!Hack one iot device, break them all!
Hack one iot device, break them all!
 
Supporting IT by David Meares
Supporting IT by David MearesSupporting IT by David Meares
Supporting IT by David Meares
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
 
Basic IoT and its Security
Basic IoT and its SecurityBasic IoT and its Security
Basic IoT and its Security
 
IOT.pptx
IOT.pptxIOT.pptx
IOT.pptx
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
IoT - Rise of New Zombies Army
IoT - Rise of New Zombies ArmyIoT - Rise of New Zombies Army
IoT - Rise of New Zombies Army
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 

More from Isaac Feliciano

More from Isaac Feliciano (8)

2. crime prevention series mail phishing (fraud)
2. crime prevention series   mail phishing (fraud)2. crime prevention series   mail phishing (fraud)
2. crime prevention series mail phishing (fraud)
 
2. cyber crime series - crypto currency theft
2. cyber crime series - crypto currency theft2. cyber crime series - crypto currency theft
2. cyber crime series - crypto currency theft
 
1. cyber crime series - identity theft
1. cyber crime series  - identity theft1. cyber crime series  - identity theft
1. cyber crime series - identity theft
 
3. Ransomware (cyber awareness series)
3. Ransomware (cyber awareness series)3. Ransomware (cyber awareness series)
3. Ransomware (cyber awareness series)
 
9. cellphone hardening (cyber awareness series)
9. cellphone hardening (cyber awareness series)9. cellphone hardening (cyber awareness series)
9. cellphone hardening (cyber awareness series)
 
7. medial infrastructure (cyber awareness series)
7. medial infrastructure (cyber awareness series)7. medial infrastructure (cyber awareness series)
7. medial infrastructure (cyber awareness series)
 
2. rats (trojans) (cyber awareness series)
2. rats (trojans) (cyber awareness series)2. rats (trojans) (cyber awareness series)
2. rats (trojans) (cyber awareness series)
 
1. spear phishing (cyber awareness series)
1. spear phishing (cyber awareness series)1. spear phishing (cyber awareness series)
1. spear phishing (cyber awareness series)
 

Recently uploaded

Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Cara Menggugurkan Kandungan 087776558899
 

Recently uploaded (6)

Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
 
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
 
Mobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsMobile Application Development-Components and Layouts
Mobile Application Development-Components and Layouts
 
Android Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesAndroid Application Components with Implementation & Examples
Android Application Components with Implementation & Examples
 
Mobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsMobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s Tools
 
Leading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdfLeading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdf
 

6. mobile security (cyber awareness series)

  • 1. Cyber Security Mobile Devices SSGT Feliciano Cyber Surety
  • 2. Evolution Risks Symptoms of being Hacked!! Countermeasures "If a bad guy (black hat hacker) has unrestricted access to your device, it is no longer your device! 
  • 3. Digital Revolution of Mobile Devices • Network of humans, machines, and Internet of Things (IoT) • Desktop Era Millions • Cellphone Era 200 Million – Past • Internet of Things Era (IoT) (Network) 10 Billion - Present • Internet of Everything Era (IoE) (Global) 50 Billion - Future
  • 4. Risks Loss of Personal Information No inherent Firewall, Anti-virus, or Encryption Unregulated Apps + Unlocked Phones Mobility = Increased Exposure App & Web-based Attacks
  • 5. • Difficult to determine • Slow performance, decreased functions • Random actions by the phone • Phone logs calls you never made • Photos, documents, and files are added/deleted without user interactions Symptoms of being hacked …. • Feel your phone & battery (excessively hot) • Check if phone lights up all by itself when not in used
  • 6. Countermeasures • Do not root or jailbreak phone • Be selective and research app • Device lock & encryption • Mobile Anti-Virus • Failed log-in auto wipe (iPhone) • No PII inside phone (backup & delete) • Limit exposure to Wi-Fi • Log-out completely from web browsers