ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Which Mobile security threats are out there?

Updated on November 24, 2015

Targets for attackers

Cell phones and tablets have never been more attractive target for criminals, as they are now. The main three targets for attackers are:

  • Data: smartphones usually contain sensitive data like personal photographs, credit card numbers, passwords, authentication information, activity logs (dialled numbers, received messages).
  • Identity: mobile phone can easily be associated with real person.Their contents are valuable. It has become an increasingly popular to steal people's identities to commit crimes.
  • Availability: bearing in mind that a lot people depend on their phones, by attacking a smartphone it is possible to disrupt someone's daily activities and business life.

PINs

It is important to remember that in order to lock your smartphone a unique, four digit PIN needs to be set. Many devices nowadays include a biometric reader to scan a fingerprint for reliable access. However, research shows that consumers seldom employ these safety mechanisms. Moreover, if users do use a password or PIN they often choose easy passwords and PINs, such as 1234 or 0000.

Two-factor authentication

Consumers hardly ever use two-factor authentication when conducting sensitive transactions on mobile devices. Many studies show that people generally use static passwords instead of two-factor authentication when using their smartphones for online sensitive transactions. Sadly, such actions have security drawbacks: passwords can be guessed, forgotten, written down and stolen.Two-factor authentication requires the use of two reliable authentication factors:

  • Something the person knows, e.g. a password or a PIN
  • Something the person owns, e.g. a mobile phone

Source

User to blame

Among others, Android seems to have attracted a lot of attention from malicious code writers due to it's popularity. However, other platforms are also potentially at risk. Consumers download malware unknowingly when looking for games, utilities, or other useful applications. Mobile malware is similar to a virus on a PC. For example, it can bog down your phone's processing speeds, check email and instant messaging history and send out emails to all contacts, sometimes delete important files and calendar entries, and cause system crashes.

Most mobile devices do not have pre-installed security software when purchased. To protect against malicious applications it needs to be installed by the user. Even though such software may slow operations and affect battery life, without it, the risk to get under attack is always high.

Operating system

Another common problem is that operating systems may be out-of-date. Quite often security patches are not pre-installed on new devices on time. It can sometimes last for months before security updates are provided by manufacturer. It is generally a complex process and depending on the nature of the vulnerability may involve many parties for a fix to be released.

A lot of times mobile phones that are older than couple of years may never receive security updates as they are out of support by manufacturer. For some models it may be just 12 to 18 months until no further updates are available. These devices may face increased risk as newly discovered vulnerabilities would never get fixed.

No Firewalls

It is uncommon for mobile devices to have firewalls to limit connections. Whenever a mobile device is connected to the network, different ports are used to communicate with other devices and the Internet. The purpose of firewall is to acts as a protection layer between the mobile device and the network. If a port is not secured, a hacker may access device through an unsecured port.

Jailbreaking

It has become increasingly popular to install unauthorized modifications. The process of removing limitations in order to be able to add features is called "jailbreaking" or "rooting". There are different reasons why someone would jailbreak or root their smartphone. One of the reasons is to bypass digital rights management restrictions which is limiting users from spreading copyrighted media. Other reasons may include desire to gain direct access to the file system, user interfaces or network capabilities. A rooted or jailbroken smartphone is vulnerable to malware and viruses and its operating system is easier to be compromised. It should come as no surprise that most device manufacturers cancel their warranty if a user jailbreaks his phone.

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)