Please enable JavaScript.
Coggle requires JavaScript to display documents.
Vulnerabilities, Threats and Attack Scenarios of Mobile Devices. (MOBILE…
Vulnerabilities, Threats and Attack Scenarios of Mobile Devices.
MOBILE DEVICE THREATS
1) Data Leakage
- Mobile apps are often the cause of unintentional data leakage. As noted by eSecurity Planet, for example, “riskware” apps pose a real problem for mobile users, who give them sweeping permissions, but don’t always check security.
- Data leakage can also happen through hostile enterprise-signed mobile apps.
2) Unsecured Wi-Fi
- No one wants to burn through their cellular data when wireless hot spots are available—but free Wi-Fi networks are usually unsecured.
- According to V3, in fact, three British politicians who agreed to be part of a free wireless security experiment were easily hacked by technology experts and had their social media, PayPal and even VoIP conversations compromised.
3) Network Spoofing
- Network spoofing is when hackers set up fake access points (connections that look like Wi-Fi networks
but are actually traps) in high-traffic public locations such as coffee shops, libraries and airports.
- In addition to using caution when connecting to any free WiFi,
never provide personal information, and if you are asked to create a login, always create a unique password, just in case.
5) Phishing Attacks
- Since mobile devices are always powered-on they represent the front lines of any phishing attack.
- Desktop users who only check their email once a day or every other day are often warned off by news sites or security bulletins before clicking through.
4) Spyware
- According to eWeek, while many mobile users worry about malware sending data streams back to foreign powers or international cybercriminals, there’s a key threat closer to home: Spyware.
- Download a solid (and legitimate) antivirus and malware detection suite to help detect and eliminate these programs before they have a chance to collect your data.
7) Broken Cryptography
- According to Infosec Institute training materials, broken cryptography can happen when app developers use weak encryption algorithms, or strong encryption without proper implementation.
- Here, the onus is on developers and organizations to enforce encryption standards before apps are deployed.
-