Home Add to Favorite Contact Submit  
             28 January, 2021

Category:  Articles » Computers » Mobile Computing


Your mobile phone is a serious computer that must be secured

         Views: 1617
2011-06-16 02:05:18     
Article by Sanjay Katkar

Mobile devices have forced a radical shift in the way human beings deal with their day-to-day activities and how organizations service their customers. Earlier there was a clear distinction between internet, the intranet and internal corporate network. But today with miniature yet powerful mobile devices carrying data, sending e-mails, social networking, banking, gamming, downloading music and video, the situation is more like scrambled eggs.

In a June 2010 report on Internet trends, Morgan Stanley predicted that by 2012 the number of smartphones shipped will exceed the total number of desktop and notebook PCs. Compact and relatively inexpensive, these devices can be used for many functions, including sending and receiving electronic mail, storing documents, delivering presentations and remotely accessing data.

Even before the advent of smartphones, malicious software and viruses were already a recognized threat to mobile devices. As of 2009, applications allowing users to view and manipulate financial accounts, auction listings, and shopping accounts linked to credit cards are becoming commonplace. Whether simple rogue text messages, fictitious billing scams or more malicious attacks using malware installed on the device, the number of attacks are increasing at an alarming rate—mobile malware increased by more than 45 percent in 2010. With less education about mobile threats and the lack of security on these devices, users seem more inclined to fall victim to them during mobile sessions.

In June 2010, a developer hacked around 400 iTunes accounts. At the end of July, 4.6 million Android users had downloaded a suspicious app that transmits data to a site in China. In the mad haste to market the products and offer increased functionality, neither mobile devices, corresponding software nor applications are designed with security as a priority.

As a result there are increasing problems from applications that upload malware or exploit vulnerabilities in new operating systems, either inadvertently or deliberately. This opens opportunities for cyber criminals to use apps to install a backdoor on such devices to use it for a range of purposes, such as sending spam or recording keystrokes to steal bank details.

Sophisticated cybercrime groups have emerged as online fraud leaders deploying malware for phishing, smishing and spear-phishing attacks. The execution is what is known as a “man-in-the-browser” attack. The man-in-the-browser (MITB) attack leverages a Trojan Horse (or simply a Trojan) - malicious software that is somehow installed—often initiated by various social engineering tactics—and resides concealed on the user's device. It wakes up when the user visits a target site, and functions by simply capturing and modifying information as it filters communication between the browser's user interface and the Internet. These attacks usually result in a loss of funds for the end-user or business, and a loss of credibility for the victim institutions.

Mobile devices are particularly susceptible to attack for a number of reasons:
The distribution of applications to the devices, via third-party app stores, makes them susceptible to the distribution of malware. And there are no application certification rules.

Users regularly check e-mail on mobile devices and the current limitations of mobile browsers make it more difficult to identify fraudulent messages and sites. This increases the risk of clicking on or being duped by fraudulent messages. The tendency for quick communication and instant response reinforces the risk.
There are no e-mail forwarding restrictions.

There are no default browser permission rules.

In the mobile scenario expectation for prompt, unobtrusive communication, creating a culture for mobile security is essential. A few ways of enhance mobile security would be:
Using effective passwords that are changed regularly.
Using a powerful AntiVirus and AntiSpyware program and updating it regularly.
Having back-ups of all important data and encrypting sensitive data.
Having an emergency response plan for mobile and wireless security breaches.
Blending proactive education with appropriate technology that protects network, mobile and wireless connections.

With mobile security turning out to be the elephant in the room, end-user security and strong authentication needs to be simple, quick and transparent.

Specialized in: Laptop Tracking - Best Internet Security Software - Top Antivirus Software 2011 - Best Virus Protection Software - Best Anti Spam Software
URL: http://www.quickheal.com
Print article      Bookmark this page
Related Articles 
Netbook Reviews - Acer AOD250 10.1 Inch Netbook (Popularity: ): Specifications: The new generation of netbooks is finally here! They now have better specs, sport great improvements in design and best of all, have lower price tags. The Acer AOD250 is a great example of such netbooks. Although most of the specs remain unchanged (such as the 1GB of RAM and the 1.6Ghz processor), there are some significant upgrades. For instance, this model now comes with a larger 250GB hard ...
Tips and Ideas to Optimize Your Laptop Battery Life (Popularity: ): Laptops are portable and light in weight. Due to its mobility, people love to work on their laptop. A laptop can operate for a long time when it has a good battery life. Hence, anyone who has a laptop desires to optimize the life of their notebook battery as it allows them to work even when there is no AC power.One should keep in mind the following points to optimize ...
Cheap New Laptops - How to Get Great Deals (Popularity: ): For most people in the world today, laptops play an important role. However, it's ironic that the people who need cheap new laptops the most, students for instance, do not have the readily available cash to go out and purchase the latest AlienWare or IBM laptop. As a result they are left with one of two choices; purchase a questionable used laptop, or purchase a cheap new laptop. The good ...
Dell Laptops Overview (Popularity: ): Dell's new laptops now feature Windows Vista you can however special order them with Windows XP installed if you are not convinced that Vista is right for you. Windows with their Vista and XP OS have set the standard for all operating systems to follow. All of Dell's basic models feature Windows Vista Home; this is more then adequate for most users and provides excellent performance without the bells and ...
Apple vs PC - The Debate Continues (Popularity: ): The debate will never seem to go away as to which system you should invest in for your computing needs. There seems to be no clear cut system and especially lately with apples new push to catch up with the PC innovations. Apple has made great strides lately in the laptop performance and innovations and they are continuing to research and develop their products. I do not think that they ...

Related Business 
Compare Phone Recycling (Popularity: ): Compare a wide range of Mobile Phone Recyclers to get the best price on the Market for your old mobile phones. Mobile phone recycling is a big industry so if you would like to receive cash for your old mobile phone then check out our mobile phone comparison website now and see how much your mobile is worth.
3 Mobile Phone Deals (Popularity: ): Mobile phone is no more a communication assistant to a human being; it is way more than that—a digital assistant. Calling or texting are slowly stepping down the rungs of the priority ladder regarding one’s mobile phone. Activities like gaming, listening to music, surfing internet, photography, sending and receiving emails and several other tasks are gaining their place. Understanding such a scenario where a mobile phone is truly becoming the ...
Mobile Phone Reviews (Popularity: ): Mobiles Australia is your one stop website for all the latest mobile phones, mobile phone news and mobile phone reviews. Our website will keep you up to date with the latest press releases from leading mobile phone manufacturers including information on Nokia mobile phones, Samsung mobile phones, Sony Ericsson mobile phones and LG mobile phones.
Mobile Safety Of Sydney (Popularity: ): Mobile Safety of Sydney, Australia is an online business that provides mobile phone accessories to reduce the dangers of mobile phone radiation. With almost 50% of normal mobile phone radiation entering the phone user's body during every call, cellular radiation safety is becoming a crucial concern. To help protect the savvy consumer from radiation, Mobile Safety offers accessories including mobile phone cases, headsets, plug-in handsets, and more. Each of these ...
R K Mobile & Accessories; Cell Phone Bluetooth Headset Supplier (Popularity: ): R K Mobile & Accessories is a well-reckoned Supplier of Mobile Phone Batteries, Mobile Phone Memory Cards, Mobile Phone Bluetooth Headset and Mobile Phone Screen Protector. We cater our products to all across India, but our main areas of operation are Surat, Navsari, Baroda, Ahmedabad, Mumbai and Junagad. We have a diverse product range suiting every customer’s requirements. While serving our customers, we take their cultural inclination, likings and interest ...
Mobile Phone Deals UK (Popularity: ): We have the best business mobile phone and tablet deals on any network with the widest range of handsets and plans to choose from. Top 21 deals brings to you the most valuable mobile phone deals being offered by the UK market. Our aim is to make sure all of your mobile phone needs are taken care of at one place.
Mobile Phone Deals (Popularity: ): Mobilephonedealscheap.co.uk is best web portal to provide comparison on latest mobile phone deals with all leading network providers in UK that comprises of O2, Orange, Vodafone, virgin, T-mobile and several others. We are dedicated to endow with affordable and cheap mobile phone deals for consumers. Compare best mobile phone deals and experience outstanding performance from innovative mobile models of renowned mobile brands such as Apple, HTC, Blackberry, LG, Nokia, Samsung, ...
The Mobile Indian (Popularity: ): Now you can easily compare all latest mobile phones. Themobileindian.com is one of the leading online mobile portal which are providing all latest mobile phone with features and full phone specification. Find the latest mobile phone with price list at The Mobile Indian.
The Mobile Phone Clinic (Popularity: ): If you want to get your phone unlocked then one of the best options is to get it done from a professional mobile store, so that it can be done in the correct manner. But what exactly is unlocking of mobile phones? This question is answered in detail in this article by our author who is an expert on all matters relating to mobile phones and mobile phone repairs. Read ...
HintaMobilePakistan (Popularity: ): Mobile Prices, Lg Mobile Prices , mobile phone Prices, Hintamobile, mobile, what mobileHintamobile, pakistan, mobile phone, Mobile Phone Pakistan, phone, nokia, samsung, sony ericsson, prices, motorola, HTC, zone, Mobile Zone