What you need to know about Mobile Malware
You may think it’s
save to access personal data on your mobile, but you’re wrong! It is just as
dangerous to use your phone as it is to use your PC without the right
precautions.
Don’t let malware take
over your phone and your life!
So, what exactly is
mobile malware? It is malicious software designed to do a range of things from
disabling your phone and controlling your device to stealing all your valuable
information. It is basically the same as PC malware, except it is used to
infect your mobile device.
The dangers of mobile
malware:
-- Bank account
details stolen
-- Private information accessed
-- Forced messages sent to premium numbers
-- Devices can be used to launch attacks on digital targets
-- Phone data is deleted
-- In the end the device is bricked and needs to be replaced
-- Private information accessed
-- Forced messages sent to premium numbers
-- Devices can be used to launch attacks on digital targets
-- Phone data is deleted
-- In the end the device is bricked and needs to be replaced
How the malware
attacks your mobile device:
-- Spyware silently
collects information from you and then sends it out to eavesdroppers
-- Phishing is when a fake version of a site is created to gather your private information
-- Some malware will exploit your mobile’s vulnerabilities in order to control your device
-- App stores are compromised when legit apps are infected with malicious code
-- Third-party online application repositories are unofficial websites so there is no control on what apps are available
-- Worms can replicate and spread themselves throughout a network
-- A Trojan app may seem legit but it is really malicious
-- Any mobile that connects to a Wi-Fi network without knowing if it is safe is open to attack
-- A direct attack can happen when files or SMS messages are sent to your phone
-- Phishing is when a fake version of a site is created to gather your private information
-- Some malware will exploit your mobile’s vulnerabilities in order to control your device
-- App stores are compromised when legit apps are infected with malicious code
-- Third-party online application repositories are unofficial websites so there is no control on what apps are available
-- Worms can replicate and spread themselves throughout a network
-- A Trojan app may seem legit but it is really malicious
-- Any mobile that connects to a Wi-Fi network without knowing if it is safe is open to attack
-- A direct attack can happen when files or SMS messages are sent to your phone
Here are the Do’s and
Don’ts of protecting your mobile device:
DO
|
DON’T
|
Make sure your OS is up to date
|
Download apps from third-party
online application repositories
|
Only download apps from trustworthy sites
|
Jailbreak your phone
|
Check the feedback from other users before installing an app
|
Leave your Wi-Fi on if you are
not using it
|
Use a strong password and a firewall
|
Use banking sites or shopping
sites on a public Wi-Fi connection
|
Turn off your Bluetooth when it is not in use
|
Leave your mobile unattended in
public places
|
Install a mobile security app
|
Forget to download a security
app to protect your phone
|
Comments
Post a Comment