Security Threat Ideas

There are obviously lots of potential threats to security on a mobile device - the fact that the signal goes through the air and could be intercepted easily means that wireless devices are especially vulnerable.  However, as well as the logical or on-line threats below don't forget that your device could also be stolen, damaged or lost too - a physical real-world threat. 

1) Data - Who has access to it. 

Some mobile apps can send data to other servers for example an advertiser server might receive data from a mobile app if you have checked a box or not checked a box.   To prevent this you can try to check on your apps settings and only give apps permissions that they insist on - if a program asks for access to things like your pictures that you don't want to give then don't use it. 

2) Unsecured Wi Fi 

This is probably the biggest threat - most free Wi Fi networks are unsecured (don't encrypt all the data using an encryption algorithm)  If you are on a free Wi Fi network then don't use applications like online banking where your data could be compromised by someone intercepting the Wi Fi Signal 

Encryption  Data transmitted across a network - especially a wireless one - is vulnerable to interception. However even if the data is intercepted if it is encrypted it cannot be read without it being decrypted. A common method of encryption is called public - private key encryption where the public key is known and available but can be combined with a private key that only the user has to make a mathematical code that is applied to the data to make it unreadable without the keys. Encrypted data is used across the Internet / www as many transactions are carried out that should remain secret, for example banking transactions or credit card purchases. You can often see that this is happening as the website will show a "secure" message or padlock and be HTTPS. This means that the data is encrypted.

3) Network Spoofing 

This is when a hacker might set up a fake access point that looks like a free Wi-Fi network but is actually a trap.  They might give the network a name (SSID) like "Airport Free Wi-Fi" or "Free coffee-shop" wifi and when people connect their data, email, passwords etc. can be collected. 

4) Phishing Attacks 

These are often when an email or text message with a link is sent - the message is trying to get the user to click on the link - it could be something like resetting your password or getting a free offer but when you click on the link it will take you to a different web site that could take your data. 

5) Spyware

A piece of software that is covertly installed and sends back to someone else details of your activities - possibly the keys you press, your contacts list, your passwords when you enter them etc.  

6) Virus / malicious code 

Code that you might download accidentally which could damage your data - wipe the data, alter it, encrypt it so you cannot read it, slow down your system until it stops etc. 

The following advice comes from Norton a leading security company. 

How to protect yourself from mobile security threats

Mobile security threats may sound scary, but here are six steps you can take to help protect yourself from them.

  1. Keep your software updated. Only 20 percent of Android devices are running the newest version and only 2.3 percent are on the latest release.1 Everything from your operating system to your social network apps are potential gateways for hackers to compromise your mobile device. Keeping software up to date ensures the best protection against most mobile security threats.
  2. Choose mobile security. Just like computers, your mobile devices also need internet security. Make sure to select mobile security software from a trusted provider and keep it up to date.
  3. Install a firewall. Most mobile phones do not come with any kind of firewall protection. Installing a firewall provides you with much stronger protection against digital threats and allows you to safeguard your online privacy.
  4. Always use a passcode on your phone. Remember that loss or physical theft of your mobile device can also compromise your information.
  5. Download apps from official app stores. Both the Google Play and Apple App stores vet the apps they sell; third-party app stores don’t always. Buying from well-known app stores may not ensure you never get a bad app, but it can help reduce your risk.
  6. Always read the end-user agreement. Before installing an app, read the fine print. Grayware purveyors rely on your not reading their terms of service and allowing their malicious software onto your device.

By taking just a few common-sense precautions, you can help protect yourself from madware and other mobile security threats.

https://us.norton.com/internetsecurity-mobile-types-of-common-mobile-threats-and-what-they-can-do-to-your-phone.html

On your PC or sometimes on a mobile device....

Anti Virus Software

This is software that we can run in the background which detects the presence of viruses - looks for specific virus "signatures" and either deletes or quarantines the files so they cannot do any damage to our system. The software can scan the whole system, monitor file transfers and email downloads as well as files downloaded from web sites.

Anti Spy Ware Software

Spy Ware is software that installs on the computer with the purpose of finding out information about us. This may be the web sites we visit, the search terms we use or more seriously the user names and passwords we type in. These types of programs can send information back to third parties across the internet compromising our security. Anti Spyware can block some of these programs from gaining access to our system, look for suspicious activity when our computer is apparently idle etc.

Firewall

A Firewall can be hardware, software or a combination of both. The firewall blocks access to the computer from the internet by closing up "ports" in the communication software that we use to access the web and communicate across the internet. Some programs can scan computers looking for open "ports" that they can use to send a spyware program or other malicious code onto our machines, they can sometimes even remotely access our files this way. A Firewall - (built into windows but also available as an extra program) can help to prevent this.