SlideShare a Scribd company logo
1 of 1
Download to read offline
 
 
10531 4S Commons Drive, Suite 166-504, San Diego, CA 92127 ● (858)538-8985
www.JustRightComputers.com
16 Tips to Thwart Mobile Security Threats
Android Security
Android devices are the biggest targets for hackers and cyber criminals – exceeding 99% of all
mobile malware. 60% of malware are Trojans in the “Fake Installer” category.
 Infected Apps won’t typically be found in or delivered via the Google Play Store
 AVOID apps from forums or Unofficial App stores
 AVOID apps from foreign countries that have only been downloaded a few times, have only a
few reviews or bad reviews – READ THE REVIEWS!
 AVOID apps (especially games) that can access or send SMS messages
 AVOID apps that need to access the directory or your location (if not necessary)
 AVOID popular apps (AngryBirds) from unofficial app stores – may be infected
 Keep your Android up to date – install manufacturer updates when you get the notice. Updates
provide security enhancements and reduce vulnerabilities.
 Install and run Bluebox Security Scanner to check your phone for Master Key vulnerability
(free app in Play Store)
 INSTALL Mobile AntiVirus software and consider VPN security software
 Watch out for Phishing attacks - email and websites can look very legitimate – check the URL
 AVOID text messages with links to websites – a very common way to spread mobile malware
iPhone Security
While iOS devices are not targeted as much as Android, a Trojan targeting iOS devices was detected
in the 1st
Quarter of 2014 (via a widely used network for rooted/hacked devices). Plus, there are some
major security concerns that need to be addressed:
 Camera and microphone can be turned on remotely without your knowledge. Consider ways to
cover the camera and mic.
 The name of the iPhone is typically the name of the user (Settings>General>About) and the
user can be tracked by this name if Bluetooth is enabled. Someone could potentially track your
child (or you) by the name of the device. TURN Bluetooth OFF when not in use.
 Access codes are not very secure. Turn off “Simple Passcode” and setup a more secure
passcode that is required to use the phone.
 Advertising Settings in your iPhone can allow stores and hackers to know exactly who you are
from the tracking data gathered by your iPhone. Turn ON “Limit Ad Tracking
(Settings>Privacy>Advertising) and periodically “Reset Advertising Identifier” so that a new ID
is generated for your device (similar to deleting cookies in a Windows PC).
 Frequent Locations – if on, provides history of ALL the places you have been including the
address and how long you were there. If your child has an iPhone, TURN THESE SETTINGS
OFF for EACH APP (Privacy>System Services>Frequent Locations)

More Related Content

What's hot

What's hot (20)

cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
How To Identify A Fake App In Playstore
How To Identify A Fake App In PlaystoreHow To Identify A Fake App In Playstore
How To Identify A Fake App In Playstore
 
Mobile security by Tajwar khan
Mobile security by Tajwar khanMobile security by Tajwar khan
Mobile security by Tajwar khan
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Your smartphone can help protect itself – and
Your smartphone can help protect itself – andYour smartphone can help protect itself – and
Your smartphone can help protect itself – and
 
Him
HimHim
Him
 
cell phone viruses and security
cell phone viruses and securitycell phone viruses and security
cell phone viruses and security
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Traveling Safely with Smartphones 061614
Traveling Safely with Smartphones 061614Traveling Safely with Smartphones 061614
Traveling Safely with Smartphones 061614
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
C 7
C 7C 7
C 7
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
spyware
spywarespyware
spyware
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
how to check deleted skype messages on iphone
 how to check deleted skype messages on iphone how to check deleted skype messages on iphone
how to check deleted skype messages on iphone
 
An introduction to Digital Security - Rishabh Dangwal
An introduction to Digital Security - Rishabh DangwalAn introduction to Digital Security - Rishabh Dangwal
An introduction to Digital Security - Rishabh Dangwal
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
 
HOW TO HACK VIBER ON IPHONE
HOW TO HACK VIBER ON IPHONEHOW TO HACK VIBER ON IPHONE
HOW TO HACK VIBER ON IPHONE
 

Similar to 16 tips to thwart mobile security threats

Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureHeimdal Security
 
Mobile Malwares Analysis - Garvit Arya
Mobile Malwares Analysis - Garvit AryaMobile Malwares Analysis - Garvit Arya
Mobile Malwares Analysis - Garvit AryaGarvit Arya
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSPurna Bhat
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidLookout
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for androidiYogi
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device securityCAS
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaAnjoum .
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?Tyler Shields
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malwareSytelReplyUK
 
The Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOSThe Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOSPriyanka Aash
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threatAli J
 

Similar to 16 tips to thwart mobile security threats (20)

Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 
Mobile Malwares Analysis - Garvit Arya
Mobile Malwares Analysis - Garvit AryaMobile Malwares Analysis - Garvit Arya
Mobile Malwares Analysis - Garvit Arya
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoS
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
Mobile Malware
Mobile MalwareMobile Malware
Mobile Malware
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for android
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware
 
Top 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOSTop 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOS
 
The Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOSThe Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOS
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
 
Trojan horseofbyod2
Trojan horseofbyod2Trojan horseofbyod2
Trojan horseofbyod2
 

16 tips to thwart mobile security threats

  • 1.     10531 4S Commons Drive, Suite 166-504, San Diego, CA 92127 ● (858)538-8985 www.JustRightComputers.com 16 Tips to Thwart Mobile Security Threats Android Security Android devices are the biggest targets for hackers and cyber criminals – exceeding 99% of all mobile malware. 60% of malware are Trojans in the “Fake Installer” category.  Infected Apps won’t typically be found in or delivered via the Google Play Store  AVOID apps from forums or Unofficial App stores  AVOID apps from foreign countries that have only been downloaded a few times, have only a few reviews or bad reviews – READ THE REVIEWS!  AVOID apps (especially games) that can access or send SMS messages  AVOID apps that need to access the directory or your location (if not necessary)  AVOID popular apps (AngryBirds) from unofficial app stores – may be infected  Keep your Android up to date – install manufacturer updates when you get the notice. Updates provide security enhancements and reduce vulnerabilities.  Install and run Bluebox Security Scanner to check your phone for Master Key vulnerability (free app in Play Store)  INSTALL Mobile AntiVirus software and consider VPN security software  Watch out for Phishing attacks - email and websites can look very legitimate – check the URL  AVOID text messages with links to websites – a very common way to spread mobile malware iPhone Security While iOS devices are not targeted as much as Android, a Trojan targeting iOS devices was detected in the 1st Quarter of 2014 (via a widely used network for rooted/hacked devices). Plus, there are some major security concerns that need to be addressed:  Camera and microphone can be turned on remotely without your knowledge. Consider ways to cover the camera and mic.  The name of the iPhone is typically the name of the user (Settings>General>About) and the user can be tracked by this name if Bluetooth is enabled. Someone could potentially track your child (or you) by the name of the device. TURN Bluetooth OFF when not in use.  Access codes are not very secure. Turn off “Simple Passcode” and setup a more secure passcode that is required to use the phone.  Advertising Settings in your iPhone can allow stores and hackers to know exactly who you are from the tracking data gathered by your iPhone. Turn ON “Limit Ad Tracking (Settings>Privacy>Advertising) and periodically “Reset Advertising Identifier” so that a new ID is generated for your device (similar to deleting cookies in a Windows PC).  Frequent Locations – if on, provides history of ALL the places you have been including the address and how long you were there. If your child has an iPhone, TURN THESE SETTINGS OFF for EACH APP (Privacy>System Services>Frequent Locations)