SlideShare a Scribd company logo
1 of 7
Securing Your Smartphone
Introduction
 New York Times: JPMorgan Chase Hacking
Affects 76 Million Households (10 other financial
firms)
 The Guardian: Eighth reporter convicted of phone
hacking (royal family and others were targeted)
 Business standard: China 'hacking into' Hong
Kong protesters' phones in 2014
 CNN: Celebrity Phones Hacked (apple, 100
celebrities such as Jennifer Lawrence targeted)
 Target – Home Depot – the list goes on !
The Bad Guys Are Out There!
 Don’t make it easy for them
 You don’t have control of all of your data
flow, but there are some things you can do!
 Taking a few simple steps to protect your
phone and your data – makes it difficult for
the bad guys to - steal your data, steal your
identity, steal your money
Smartphones
 A Smartphone is not just a phone?
 Smartphones holds massive amounts of data –
with many inferences
 Think about it – text messages, video, browser history, call
data, itunes content, location data, health data, financial data,
………
 Theft of this data would be extremely invasive – to you and
many of the people that you communicate with
 June Supreme court ruled 9-0 that to search a cell
phone requires a warrant
What Are Cell Phone Companies Doing?
 Encrypting your phone – some by default (Apple)
 Makes it nearly impossible for hackers & others (e.g. the NSA)
to crack - Would take ~ 5 ½ years to crack
 Modestly Increasing security cloud sites – Cloud
data storage is not very legislated or governed, and
hence insecure
What Can You Do?
 Use strong passwords/passcodes - don’t use ‘1111’,
change password --- brute force attacks
 Don’t down load anything sent via suspicious text
message or email
 Update apps – app updates often fix old security flaws,
only give apps need permissions does a simple flash light
app need your location?
 Don’t sign into a non secure Bluetooth network –
turn Bluetooth off when you aren’t using it
 Delete your browsing history every once in a while
 If you are ambitious – go to the cell phones site and
look at their recommendations
Conclusion
Be aware – you are carrying on your person a hand
held computer that gives a detailed, fine grained
picture of who you are, what you do, where you have
been, who you talk to, how much money you have, ….
Every system can be hacked– it just takes time
the harder you make it for the bad guys – the more
likely they give up and move on to the next victim.

More Related Content

What's hot

Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsRonalyn_Cao
 
OSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesOSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesSyedAmoz
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
Vishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Badgujar
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethicsJohnlery Guzman
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Naval OPSEC
 
Revision Terrorist And Rebel Use Of It (David & Jorge)
Revision   Terrorist And Rebel Use Of It (David & Jorge)Revision   Terrorist And Rebel Use Of It (David & Jorge)
Revision Terrorist And Rebel Use Of It (David & Jorge)itgsabc
 
InfraGard Cyber Tips: October, 2015
InfraGard Cyber Tips: October, 2015InfraGard Cyber Tips: October, 2015
InfraGard Cyber Tips: October, 2015Ryan Renicker CFA
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For EducatorsMaria Petropulos
 
Cyber crimes presentation
Cyber crimes presentationCyber crimes presentation
Cyber crimes presentationMaazUddin7
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskRob Ragan
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts Sophos
 
Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpointTy122987
 

What's hot (19)

Apple vs. FBI
Apple vs. FBIApple vs. FBI
Apple vs. FBI
 
CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
OSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesOSINT with Practical: Real Life Examples
OSINT with Practical: Real Life Examples
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Vishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM Spying
 
Hackers
HackersHackers
Hackers
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14
 
Revision Terrorist And Rebel Use Of It (David & Jorge)
Revision   Terrorist And Rebel Use Of It (David & Jorge)Revision   Terrorist And Rebel Use Of It (David & Jorge)
Revision Terrorist And Rebel Use Of It (David & Jorge)
 
InfraGard Cyber Tips: October, 2015
InfraGard Cyber Tips: October, 2015InfraGard Cyber Tips: October, 2015
InfraGard Cyber Tips: October, 2015
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
 
Cyber crimes presentation
Cyber crimes presentationCyber crimes presentation
Cyber crimes presentation
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpoint
 

Similar to Secure Your Smartphone with Strong Passwords and Updates

cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and securityAkhil Kumar
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your usersSimpliv LLC
 
Frontiers of Computational Journalism week 11 - Privacy and Security
Frontiers of Computational Journalism week 11 - Privacy and SecurityFrontiers of Computational Journalism week 11 - Privacy and Security
Frontiers of Computational Journalism week 11 - Privacy and SecurityJonathan Stray
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesBlake Carver
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device securityCAS
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter Cyber Security
 
Phishing & spamming
Phishing & spammingPhishing & spamming
Phishing & spammingKavis Pandey
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptxRajviNikeetaRathore
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Human Factor on Information Security -- Origin of Information Leakage
Human Factor on Information Security  -- Origin of Information LeakageHuman Factor on Information Security  -- Origin of Information Leakage
Human Factor on Information Security -- Origin of Information LeakageToru Nakata
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2JeffUrgelles
 
Prevent Strikes On Industrial And Civil Items Using Access Control
Prevent Strikes On Industrial And Civil Items Using Access ControlPrevent Strikes On Industrial And Civil Items Using Access Control
Prevent Strikes On Industrial And Civil Items Using Access Controlmorticelocksnational21
 
Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01Donna Koger
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile SecurityLookout
 

Similar to Secure Your Smartphone with Strong Passwords and Updates (20)

CyberCrime attacks on Small Businesses
CyberCrime attacks on Small BusinessesCyberCrime attacks on Small Businesses
CyberCrime attacks on Small Businesses
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
Frontiers of Computational Journalism week 11 - Privacy and Security
Frontiers of Computational Journalism week 11 - Privacy and SecurityFrontiers of Computational Journalism week 11 - Privacy and Security
Frontiers of Computational Journalism week 11 - Privacy and Security
 
AMMU
AMMUAMMU
AMMU
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Users guide
Users guideUsers guide
Users guide
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
Phishing & spamming
Phishing & spammingPhishing & spamming
Phishing & spamming
 
Seminar
SeminarSeminar
Seminar
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Human Factor on Information Security -- Origin of Information Leakage
Human Factor on Information Security  -- Origin of Information LeakageHuman Factor on Information Security  -- Origin of Information Leakage
Human Factor on Information Security -- Origin of Information Leakage
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
Prevent Strikes On Industrial And Civil Items Using Access Control
Prevent Strikes On Industrial And Civil Items Using Access ControlPrevent Strikes On Industrial And Civil Items Using Access Control
Prevent Strikes On Industrial And Civil Items Using Access Control
 
Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 

Secure Your Smartphone with Strong Passwords and Updates

  • 2. Introduction  New York Times: JPMorgan Chase Hacking Affects 76 Million Households (10 other financial firms)  The Guardian: Eighth reporter convicted of phone hacking (royal family and others were targeted)  Business standard: China 'hacking into' Hong Kong protesters' phones in 2014  CNN: Celebrity Phones Hacked (apple, 100 celebrities such as Jennifer Lawrence targeted)  Target – Home Depot – the list goes on !
  • 3. The Bad Guys Are Out There!  Don’t make it easy for them  You don’t have control of all of your data flow, but there are some things you can do!  Taking a few simple steps to protect your phone and your data – makes it difficult for the bad guys to - steal your data, steal your identity, steal your money
  • 4. Smartphones  A Smartphone is not just a phone?  Smartphones holds massive amounts of data – with many inferences  Think about it – text messages, video, browser history, call data, itunes content, location data, health data, financial data, ………  Theft of this data would be extremely invasive – to you and many of the people that you communicate with  June Supreme court ruled 9-0 that to search a cell phone requires a warrant
  • 5. What Are Cell Phone Companies Doing?  Encrypting your phone – some by default (Apple)  Makes it nearly impossible for hackers & others (e.g. the NSA) to crack - Would take ~ 5 ½ years to crack  Modestly Increasing security cloud sites – Cloud data storage is not very legislated or governed, and hence insecure
  • 6. What Can You Do?  Use strong passwords/passcodes - don’t use ‘1111’, change password --- brute force attacks  Don’t down load anything sent via suspicious text message or email  Update apps – app updates often fix old security flaws, only give apps need permissions does a simple flash light app need your location?  Don’t sign into a non secure Bluetooth network – turn Bluetooth off when you aren’t using it  Delete your browsing history every once in a while  If you are ambitious – go to the cell phones site and look at their recommendations
  • 7. Conclusion Be aware – you are carrying on your person a hand held computer that gives a detailed, fine grained picture of who you are, what you do, where you have been, who you talk to, how much money you have, …. Every system can be hacked– it just takes time the harder you make it for the bad guys – the more likely they give up and move on to the next victim.