Skip to main content

"cellphones security"

Mobile Security



Mobile security has become increasingly important as more & more users & business use smartphones to communicate.



But smartphones collect & compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the users.

All smartphones,as computers,can be the target of attacks. It can be done by SMS,MMS,Bluetooth & GSM.

3 main targets for attackers:-

  1. Data: smartphones are devices for data management, and may contain sensitive data like credit card numbers, authentication information, private information, activity logs (calendar, call logs) 
  2. Identity: smartphones are highly customizable, so the device or its contents can easily be associated with a specific person.
  3. Availability: Attacking a smartphone can limit access to it and deprive the owner of its use.


Main Sources:-

  • Professionals, whether commercial or military, who focus on the three targets mentioned above. They steal sensitive data from the general public. 
  • Thieves who want to gain income through data or identities they have stolen. The thieves will attack many people to increase their potential income;
  • Black hat hackers who specifically attack availability.Their goal is to develop viruses, and cause damage to the device
  • Grey hat hackers who reveal vulnerabilities.Their goal is to expose vulnerabilities of the device.Grey hat hackers do not intend on damaging the device or stealing data.
















Safegaurd to protect mobile phones:-

  • Use a PIN/keylock code
           The reasons for doing so are obvious – if a phone is lost, stolen or simply left unattended,anyone that picks it up will have unrestricted access also set up a SIM card lock in the form  of a PIN number that will need to be entered when a phone is turned on in order to connect to a network. 

  • Protect sensitive data
           Most smartphone platforms offer software that can encrypt files or folders on a device with industry-standard protection, which means a code must be entered before a file can be viewed or copied

  •  Watch your wireless
           The first thing to remember is to always switch off a wireless connection when it’s not in use. It ensures that malicious parties can’t connect to a device without your knowledge. 

  • Bluetooth
           Hackers have found ways to remotely access a phone (provided they are within range) and use it to make calls, access data, listen in on conversations and browse the internet.To prevent this set default Bluetooth configuration to “non-discoverable” mode by default

  • Rooting your phone
           Rooting is usually only done by “experts”, who should therefore be aware of the potential dangers, but if someone offers to root a phone for you while citing the benefits, it’s important to be aware of the security risks as well.

  • Back up your data
          Ensuring that regular backups are made is therefore essential.Most modern phones now allow users to “synchronise” information with a computer or website for productivity or backup purposes.This can include e-mails and contacts with Microsoft Outlook, photos uploaded to online storage or proprietary software supplied by the phone manufacturer to simply backup key data in the event of loss.

  • Security software
           Security software can help you avoid many of the potential dangers associated with smartphones. Furthermore, it’s possible to lock a device remotely, requiring password access on the handset or a specific unlock request to enable it. If a phone has simply been misplaced in the home, an audible alert request can be sent to the device to signal its location, and it’s even possible to erase sensitive data remotely if you’re sure it has found its way into the wrong hands.







                                                        

                                                                                                website: https://www.ica.in/
                                                                                                Helpline No: 9968600000
                                                                                                Email: cyberarmy@ica.in  

Comments

Popular posts from this blog

cybercrime case studies #1

FACEBOOK FAKE PROFILE CASES Facebook.com is a very popular online community and social networking website. Facebook users can search for and interact with people who share the same hobbies and interests. They can create and join a wide variety of online communities. The profiles of Facebook members are publicly viewable. THE SCENARIOS ·           A   fake profile of a woman is created  on Facebook. The profile displays her correct name and contact information (such as address, residential phone number, cell phone number etc). Sometimes it even has her photograph. The problem is that the profile describes her as a prostitute or a woman of “loose character” who wants to have sexual relations with anyone. Other Facebook members see this profile and start calling her at all hours of the day asking for sexual favors. This leads to a lot of harassment for the victim and also defames her in society. ·     ...

India’s Perspective: Need of Ethical Hacker’s in India

The word hacker has always been associated with a negative meaning.  In actual “hacker’' is someone who can build stuff and solve real-life problems.   It’s essential to get highlighted with difference between a hacker and a cracke r ; a cracker is someone who is adept in security breaking whereas a hacker is someone expert in preventing such incidents. With the rapid spread out of cyber-crime it has become difficult for companies to protect their critical data and security systems from the external threats coming in from the web. These companies are unaware to cope with this crime or don’t have a cyber-incident response plan ready with them. Companies and start-up ventures in India are not exposed or rather vulnerable to cyber-attacks or crimes. They must be aware and need strong security measures to safeguard their business with safety plug-ins. ETHICAL HACKING An ethical hacking has becoming a valued skill in India.... For more click here.. ...

Shop Safely in this FestiveSeason

Online shopping: It is also known as e-shopping in which the purchases made online either by computers or SmartPhones. You can shop online with or without full authentication . E-shopping or online shopping or e-store are all virtual types of stores which allow customers to buy products or services over the internet. It is convenient for the people to shop online without spending their valuable time in markets. But There is risk in ordering things online as Information about user’s activity on the Web is being recorded and there will be privacy losses. Many users are not aware about it. Web users leave a “data shadow” with information about what they read, where they shop, what they buy, whom they correspond with and so on. Mantras to shop online safely: Before Placing An Order Carefully read the terms and conditions, including the small print. These terms and conditions should be available on the merchant’s website. Check t...