Mayur Rele | Smartphones Cybersecurity Loopholes

Mayur Rele: The Smartphone is a gadget one cannot contemplate living without! You need it to set alarms in the morning, set reminders for appointments, receive notifications on the nearest coffee shops, catchup with your friends after work, pay electricity bills, do some shopping and book a doctor’s appointment. Many are also using the Smartphone for business like making orders and paying for transactions made. It has become a necessity rather than a luxury, you can’t miss it in your pocket, briefcase or handbag.

Mobile social networking applications in most cases lack Technical security measures like firewalls, encryption and antivirus found in Personal Computers. Unfortunately, many users are unaware of such shortcomings and they are reluctant to activate the Antiviruses which come with new gadgets. According to Mayur Rele As a result, smartphone users have become an easy target to Cyber-attacks especially Hacking.

Here is a list of 5 common Smartphone threats you need to be careful about.

1Riskware apps

These are free mobile apps available on the internet. Users unknowingly grant them permission in their gadget posing a threat to unintentional data leakage. To be safe, install only the apps you are sure of and that you need from a credible source. Avoid malicious malware.

2Free Wi-Fi networks

 Such networks are available in public places and they are tempting for anyone to log in. They are unsecured and very prone to cyber-attacks. Never use them to access personal data or make financial transactions, your credentials like passwords and bank details can easily be stolen. If possible, avoid them at all cost and use trusted Wi-Fi networks.

3. Spoofing

 This is a cyber-attack from a fake access point posing as a Wi-Fi supplier but they are actually trapped to unsuspecting Smartphone users. They are common in high traffic areas like Clubs, Colleges, libraries and busy transport Terminus. Mobile users are extremely vulnerable as confidential information can be stolen and contents in personal accounts read in real-time. The requirement is users to open an account in order to access the free Wi-Fi, they then target the email and password submitted as users are likely to use a single email for multiple accounts. To protect your personal information, never click on unfamiliar links, or if possible, avoid such untrusted networks.

4.Weak Encryption

Mobile phone application makers can code a weak application that is susceptible to attacks. Insecure applications make mobile users vulnerable to numerous Cyber-attacks as criminals can easily by-pass with no firewalls installed to access personal data or steal passwords.

5.Spyware

 These are spying or stalking applications installed in a Smart phone by family members, spouses or the employer without the owner’s consent in order to keep track of their whereabouts or activitiesThey are not easily noticeable but they can be detected with a malware detection suite. To avoid that, keep your gadgets to yourself and always take note of who has access to the phone.

What can you do to avoid such attacks?

Mayur Rele says, always use reliable and Secure Wi-Fi networks, keep an account of who have an access to your Smartphone at all times, and also have your gadget occasionally scanned by professionals to detect any suspicious spyware. Finally, conduct due diligence and understand the nature of mobile phone threats to make yourself secure.

Originally Posted at : https://articleshubspot.com/mayur-rele-smartphones-cybersecurity/

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s