The Nuances of Mobile Security

Mobile phone, especially a smartphone, is no longer simply a communication tool. Nowadays, more and more mobiles users and especially the business professionals use smartphones to plan and organize personal and official life as well.

However, on the flip side, this sudden increased dependency on technology is inflicting profound changes within data systems and is becoming a source of risk. Undoubtedly,  smartphones collect an increasing amount of sensitive data the access to which should be controlled to guard the privacy of the user and the organizations which inevitably become a part of the vicious circle.

Types of attacks:

1) Attack made through messages:

An attack can be made possible by sending an irregular block of text, thereby causing the phone to restart, leading to DOS attacks. For example, If you have a Siemens S55 OS and you have received a text message containing a Chinese character, it could lead to a denial of service as its not defined in the OS functioning.

2) Attacks made through Wi-Fi:

An attacker can try to eavesdrop on your Wi-Fi Connection to get information like your password. These types of attacks are not so common to smartphones, but they are very open to these attacks because quite often Wireless communication (Wi-Fi) is the only means of communication. With brute force attacks and attacker can easily access the requisite information. So, it is suggested to use WPA / WPA2 protocol instead of WEP.

3) Attacks made through Bluetooth connection:

These are one of the most common attacks wherein, the attacker can easily transmit a file and get the access to your device. Consequently, there is a dire need to protect your smartphone against such threats.
You will be shocked to know that in the last two quarters closing 2012, the number of unique mobile threats grew by 161%, according to a research. Such threats increase the probability of data loss, data thefts etc. So, the big question that arises is how can this be controlled ?

Generic & effective ways:

An antivirus software can be installed on a device to verify if it is corrupted by a known threat, usually by SDS (Signature Detection Software) that detects the corrupt files.

Most of the smartphones these days are using Biometric Locks, which uses a technology to identify a person by means of her morphology (eye or face detection). In this case, only the primary user would be able to unlock the phone and so your data would remain secure.

Do’s and Dont’s:

> Do not be overly vulnerable
Do not believe in everything that is presented while downloading an app. A lot of information that is asked can be phishing or attempting to distribute a malicious code. Do check the reputation of that app before using.

> Be careful
Protect it by using simple gestures like – Lock your phone when not in use, do not leave your handset unattended. Also, do not store a lot of sensitive data on such devices.

> Look for the permissions granted to apps
Do ensure the privileges required by an application during installation and do not accept if the rights are inconsistent.

Albeit, it is not impossible to insulate your device against such threats completely, however, an intelligent and careful user can protect himself from sudden data loss or data theft.

19 thoughts on “The Nuances of Mobile Security

  1. The information provided on this blog is really helpful ..
    Looking for even more exciting and interesting facts regarding this electronic world..
    Have one ques — can i get an antivirus for my micromax phone??/
    Really need .. Plz help!!

  2. Have been going through your blogs, and have bookmarked your website. Was looking for some info on mobile security, got one through yours. Kepp up the good work. Cheers! Mark

    • Absolutely, was indeed facing trouble, so that’s why thought of compiling this Article, that can be useful for everyone.

  3. I truly feel like the writer has substantial expertise in this subject matter. Pretty great put up. I discovered your web site excellent for my requirements. Thanks for sharing the excellent ideas. This is an interesting and so nicely taken care of blog.

  4. I am quite appreciated for this website. Its an useful topic. It help me extremely significantly to resolve some troubles. Its opportunity are so fantastic and functioning design so fast. I feel it might be assist all of you. Many thanks a whole lot for enjoying this beauty site with me. I am appreciating it very much! Searching forward to yet another excellent blog. Great luck to the creator! all the best

  5. This is a excellent inspiring article.I am fairly significantly pleased with your great operate.You set really quite valuable valuable data. Maintain it up. Maintain blogging. Hunting to looking through your subsequent submit.

Leave a Reply to himanshu Cancel reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>