Smartphone and Tablet Security: How to Defeat Phishing, Stealing and Rogue Apps

June 24, 2014 Timothy Mobile Apps

The Arkansas State University SBTDC pinned a short but useful article from Inc. magazine, Tracking (and Thwarting) the Latest Mobile Threats, to their technology board on Pinterest.

The piece focuses on three major tactics used against mobile phones and tablets: phishing, stealing, and rogue apps.

Phishing (or WiPhising, the mobile version) is the most common and easiest to defeat. Mobile devices broadcast a radio signal and listen for a response from a WiFi access point. Hackers set up their own access points or eavesdrop on your signals to an access point. The defense is simple. Use a virtual private network (VPN) like Private Internet Access ($7/month, $40/year).

Actually stealing an unguarded phone or tablet is the another common threat. In addition to keeping an eye on your belongings, don’t store high value data (credit card numbers, bank accounts, etc.) on your mobile device. Use the cloud. Secondly, since you’re not likely to recover the device, remote wiping and disabling is a must.

Finally, beware of those free games and apps you’re fond of downloading. While you’re happily distracted, your device is being copied to servers in Eastern Europe or China. Caveat Emptor! Buyer beware.

Inc. offers a few other good security suggestions concerning Bluetooth, passwords, and upgrades. Take an extra few minutes to read the article.

 

email
Timothy

About Timothy Lee

Tim, the Arkansas Small Business and Technology Development Center's webmaster and technical training specialist, has been with ASBTDC since 1995. He retired from the U.S. Air Force with the rank of master sergeant. He's a bit gung-ho, turns cat food cans into cook stoves, and keeps packing ASBTDC equipment for rapid worldwide deployment, but he's your "go to" guy for technical solutions and full-scale disasters.

mobile technology, Security,

Comments are currently closed.