SlideShare uma empresa Scribd logo
1 de 68
Baixar para ler offline
ways to protect
your mobile
security5
As the world becomes more
connected, security needs to
be at the forefront of people’s
minds as they use mobile
devices to live every day life.
By looking at insights into our behaviors on
mobile devices, we can change those behaviors
to keep our devices and data safe and private.
5
1
2
3
4
5 things to consider to protect
your mobile safety:
The silly things we do with our passwords
The case for not jailbreaking/rooting your device
The real story behind those software updates
The problem with public Wi-Fi
The ways we accidentally give over our information on mobile
5
1
2
3
4
The silly things we do with our passwords
The case for not jailbreaking/rooting your device
The real story behind those software updates
The problem with public Wi-Fi
The ways we accidentally give over our information on mobile
It’s hard to remember the
myriad of passwords we use
for our accounts online.
There are a number of ways we hear of
people dealing with this, including writing
them down on a piece of paper or using the
same password across all your accounts.
One of the most concerning
practices we’ve heard of,
however, is storing your
passwords in your mobile
contacts.
One of the most concerning
practices we’ve heard of,
however, is storing your
passwords in your mobile
contacts.
This is a definite DON’T DO
in our books.
I’m hiding them in there!
I’m hiding them in there!
One of the main justifications we’ve heard for storing
your passwords as contacts is that you’re actually
“hiding” them in there. Have you ever “hidden” a file
in a file in a file on your PC in the hopes that it’d be
hard for someone to find it? It’s a similar mentality.
I’m hiding them in there!
One of the main justifications we’ve heard for storing
your passwords as contacts is that you’re actually
“hiding” them in there. Have you ever “hidden” a file in
a file in a file on your PC in the hopes that it’d be hard
for someone to find it? It’s a similar mentality.
But you’re not actually hiding them at all.
There are tons of legitimate apps
that access contact information.
There are tons of legitimate apps
that access contact information.
Your social networks do it, your shopping apps do it, your health
apps do it. Most of the time apps use your contacts in order to
help you find friends or invite new people to the service. While
the intentions are good, you might wind up sharing all of your
passwords with the developers of the apps on your phone.
There are tons of legitimate apps
that access contact information.
Your social networks do it, your shopping apps do it, your health
apps do it. Most of the time apps use your contacts in order to help
you find friends or invite new people to the service. While the
intentions are good, you might wind up sharing all of your
passwords with the developers of the apps on your phone.
Suddenly, you don’t know how your passwords are being stored,
who has access to them, and if the systems they’re living on are
protected from attack.
But seriously, remembering all
those passwords is a chore.
But seriously, remembering all
those passwords is a chore.
We get it, many people have upwards of 100 accounts online and you
always hear the advice, “Use a different password for all your important
accounts!” There are tools that can help. 1Password and LastPass are
online password management tools that store all of your passwords
and let you use one password across all of you accounts.
But seriously, remembering all
those passwords is a chore.
We get it, many people have upwards of 100 accounts online and you
always hear the advice, “Use a different password for all your important
accounts!” There are tools that can help. 1Password and LastPass are
online password management tools that store all of your passwords and
let you use one password across all of you accounts.
Of course, no system is perfectly secure and any time you store data
online, you run the risk of losing that data. However, the benefit of
storing your passwords in a safe, managed service hugely outweighs
the risk of storing them in your contacts.
5
1
2
3
4
The silly things we do with our passwords
The case for not jailbreaking/rooting your device
The real story behind those software updates
The problem with public Wi-Fi
The ways we accidentally give over our information on mobile
Jailbreaking your iOS device
(or rooting in the case of
Android) is tempting.
After all, who wouldn’t want access to a
whole new world of apps, easier international
travel, and more control over their phone?
If you’ve felt the lure to read the latest jailbreaking/rooting
tutorial and take the plunge, you’re not alone:
An estimated 7.5 percent of all iPhones —
amounting to more than 30 million
devices worldwide — are jailbroken.
Jailbreaking is especially popular in China, where an
estimated 13 percent of all iPhones are jailbroken.
While we understand the temptation, we have one piece of advice:
Unless you’re a pro, avoid jailbreaking.
There are many security concerns you might
not realize if you jailbreak / root your device.
There are many security concerns you might
not realize if you jailbreak / root your device.
In many cases you may need to change some security settings on the device
in order for the jailbreak to work. Those who don’t know what they’re doing,
however, may not know how to properly reinstate security settings after the
jailbreak is complete, leaving themselves open to attack.
There are many security concerns you might
not realize if you jailbreak / root your device.
In many cases you may need to change some security settings on the device in
order for the jailbreak to work. Those who don’t know what they’re doing,
however, may not know how to properly reinstate security settings after the
jailbreak is complete, leaving themselves open to attack.
People with jailbroken phones will also readily download third-party apps.
Though this is possible to do on non-jailbroken devices, it is much easier to
accomplish in a jailbroken environment. Apps on a jailbroken device can also
run with escalated privileges and access sensitive data belonging to other apps.
There are many security concerns you might
not realize if you jailbreak / root your device.
In many cases you may need to change some security settings on the device in
order for the jailbreak to work. Those who don’t know what they’re doing,
however, may not know how to properly reinstate security settings after the
jailbreak is complete, leaving themselves open to attack.
People with jailbroken phones will also readily download third-party apps.
Though this is possible to do on non-jailbroken devices, it is much easier to
accomplish in a jailbroken environment. Apps on a jailbroken device can also
run with escalated privileges and access sensitive data belonging to other apps.
For example, the recent Keyraider malware impacted jailbroken iOS devices
and stole 225k Apple accounts.
It’s not just about security.
It’s not just about security.
Outside of security, there are many other reasons to be wary of
jailbreaking or rooting your phone. For one, you’ll likely kiss any built-
in customer support or warranty goodbye, which is problematic if you
ever have a problem with your phone (and potentially out of several
hundred dollars). It can also wreak havoc on battery life, and make
your phone inoperable with future operating systems.
It’s not just about security.
Outside of security, there are many other reasons to be wary of
jailbreaking or rooting your phone. For one, you’ll likely kiss any built-
in customer support or warranty goodbye, which is problematic if you
ever have a problem with your phone (and potentially out of several
hundred dollars). It can also wreak havoc on battery life, and make
your phone inoperable with future operating systems.
So, to keep your phone safe and running optimally, stay far away
from jailbreaking/rooting. It might be less fun coloring in between
the lines, but it’s one of the best things you can do for your phone
and data.
5
1
2
3
4
The silly things we do with our passwords
The case for not jailbreaking/rooting your device
The real story behind those software updates
The problem with public Wi-Fi
The ways we accidentally give over our information on mobile
Updating your software is
sometimes an inconvenience,
but it’s also necessary to
keeping up your mobile
security hygiene.
Sometimes updates require connecting
to a power source, backing up data, or
temporarily losing access to an app or
service while the update processes.
Whatever the reason, oftentimes we
see that little tally of available updates
increase and increase.
The problem is, there are many
critical security fixes that get
pushed through these OS and
app updates and when we
ignore them, we leave ourselves
vulnerable and open to attack.
It just says “bug fixes” and feature
upgrades, why should I care?
It just says “bug fixes” and feature
upgrades, why should I care?
Those “release notes,” or the details that show
you what you’re getting in a software update
don’t often tell the whole story.
Take, for example, these updates:
These are real release notes in the “What’s New”
section from apps affected by a piece of malware
called XcodeGhost. The updates, though, just
look like run-of-the-mill feature changes.
Here you only see “Support for
iOS 9.” This is vague and it doesn’t
mention anything about security,
but, in fact, the app had updated
to get rid of the malware.
Here you see a more detailed
reference to, “Security issue caused
by external malware affecting v6.2.5
was fixed in v6.2.6 and above.” This
also references XcodeGhost and an
update to get rid of the malware.
You always want to be running on the
most up-to-date software on your device.
You always want to be running on the
most up-to-date software on your device.
In the security industry, when software is “patched,” that often means
researchers can publish their findings — meaning bad guys and good
guys alike suddenly have more information about vulnerabilities and
other problems.
You always want to be running on the
most up-to-date software on your device.
In the security industry, when software is “patched,” that often means
researchers can publish their findings — meaning bad guys and good
guys alike suddenly have more information about vulnerabilities and
other problems.
Releasing this information is a good thing because it helps security
teams learn how to secure their software, but it also means that people
need to download the latest patches to make sure they’re safe.
5
1
2
3
4
The silly things we do with our passwords
The case for not jailbreaking/rooting your device
The real story behind those software updates
The problem with public Wi-Fi
The ways we accidentally give over our information on mobile
We’ve all been there: you’re running low on data, but
you’re stuck in a really long line and want to check
Facebook. Maybe you’re at the airport and realized you
didn’t download that eBook for the plane.
Unfortunately, connecting to and
using that public Wi-Fi may be
jeopardizing your data and privacy.
Isn’t it fine if I’m only on there for a minute?
Isn’t it fine if I’m only on there for a minute?
When you use the Internet, you’re sending communications between
computers. Accessing Facebook? Your phone is effectively talking to
Facebook. The problem with public Wi-Fi is something called a
“Man-in-the-Middle Attack,” whereby an attacker can sit on the Wi-Fi
connection and eavesdrop on this conversation.
Isn’t it fine if I’m only on there for a minute?
When you use the Internet, you’re sending communications between
computers. Accessing Facebook? Your phone is effectively talking to
Facebook. The problem with public Wi-Fi is something called a “Man-in-
the-Middle Attack,” whereby an attacker can sit on the Wi-Fi connection
and eavesdrop on this conversation.
In this attack, a person is able to listen in on an unprotected network,
intercept your communications, and decrypt them (if they’re even
encrypted in the first place) to read what you’re talking about.
I don’t have anything interesting to say, so I’m safe.
I don’t have anything interesting to say, so I’m safe.
Downloading a book? You probably had to enter in your username and
password. This counts as a communication that can be intercepted.
Did you quickly enter your credit card information? That counts as well.
Send off a last-minute work email that may have included sensitive
info? That, too.
I don’t have anything interesting to say, so I’m safe.
Downloading a book? You probably had to enter in your username and
password. This counts as a communication that can be intercepted. Did
you quickly enter your credit card information? That counts as well. Send off
a last-minute work email that may have included sensitive info? That, too.
We oftentimes don’t realize the kind of information we access or input on
our mobile devices, but these phones and tablets are with us all the time.
They access all kinds of personal data we should want to keep close to
the chest.
Am I not supposed to use public Wi-Fi then?
Am I not supposed to use public Wi-Fi then?
In a way, yes. If you can avoid hopping on that free network, do. However,
there are safe ways to surf the Internet while you’re on the go! Use your 4G/
LTE networks — they are much safer than public Wi-Fi. If you want to work at
a coffee shop with free Wi-Fi, use a VPN to encrypt your traffic.
Am I not supposed to use public Wi-Fi then?
In a way, yes. If you can avoid hopping on that free network, do. However,
there are safe ways to surf the Internet while you’re on the go! Use your 4G/
LTE networks — they are much safer than public Wi-Fi. If you want to work at
a coffee shop with free Wi-Fi, use a VPN to encrypt your traffic.
If all else fails, avoid any transactions over public Wi-Fi that may involve
signing into an account, checking email, or paying for something. Your
data will thank you for it.
5
1
2
3
4
The silly things we do with our passwords
The case for not jailbreaking/rooting your device
The real story behind those software updates
The problem with public Wi-Fi
The ways we accidentally give over our information on mobile
Smartphones are small, portable
and give us access to a world of
information literally in our pockets.
But mobile devices’ small form also means we interact
with them pretty differently than desktop computers. In
fact, studies have shown that users are 3x more likely to
click on a malicious link from their smartphone than a PC!
Enter, phishing
Enter, phishing
We’ve all received phishing emails: they are typically designed to look like
messages from banks, credit card companies, and similar organizations.
The emails often have urgent subject lines requiring action to lure you to a
phony website that looks—at least on a cursory glance—legitimate. Think:
“Please verify your account” or “2nd Collections Notice.”
Enter, phishing
We’ve all received phishing emails: they are typically designed to look like
messages from banks, credit card companies, and similar organizations. The
emails often have urgent subject lines requiring action to lure you to a phony
website that looks—at least on a cursory glance—legitimate. Think: “Please verify
your account” or “2nd Collections Notice.”
After clicking on the link and believing that you’ve landed on the organization’s
actual website, you may enter in your username and password — unknowingly
disclosing your private information to scammers.
Tricky business
Tricky business
While phishing isn’t new, it does have unique repercussions when you receive
malicious communications on mobile — and attackers know this. For one, it’s hard to
see if a link is actually legitimate. On a PC, you can hover over a link to determine if it
will redirect to a suspicious looking address, but on mobile that’s not the case.
Tricky business
While phishing isn’t new, it does have unique repercussions when you receive
malicious communications on mobile—and attackers know this. For one, it’s hard to
see if a link is actually legitimate. On a PC, you can hover over a link to determine if it
will redirect to a suspicious looking address, but on mobile that’s not the case.
It’s also harder to spot if you’re on a suspicious website, if you do end up clicking
through. For instance, if you’re on a large monitor you may pick up on a URL reads
“usbanki.com” instead of “usbank.com,” but on a mobile device it is much more
difficult to spot this distinction. On PC you can also look for the “HTTPS” at the
front of a URL, indicating that it is using a secure connection, but this is also not
immediately evident on mobile where you have to click on the address bar and
scroll to the front of the URL to determine if the site uses HTTPS.
Tricky business
While phishing isn’t new, it does have unique repercussions when you receive malicious
communications on mobile—and attackers know this. For one, it’s hard to see if a link is
actually legitimate. On a PC, you can hover over a link to determine if it will redirect to a
suspicious looking address, but on mobile that’s not the case.
It’s also harder to spot if you’re on a suspicious website, if you do end up clicking
through. For instance, if you’re on a large monitor you may pick up on a URL reads
“usbanki.com” instead of “usbank.com,” but on a mobile device it is much more difficult
to spot this distinction. On PC you can also look for the “HTTPS” at the front of a URL,
indicating that it is using a secure connection, but this is also not immediately evident
on mobile where you have to click on the address bar and scroll to the front of the URL
to determine if the site uses HTTPS.
Even incredibly tech-savvy people can fall prey to these schemes. The result? Your
sensitive information gets in the hands of attackers who will likely use it for their gain.
Don’t get phished — get savvy
Don’t get phished — get savvy
To avoid getting phished on mobile, the best thing is to avoid clicking on
email messages and links that just don’t look right. Messages requesting your
password, login details, or other important financial information should
especially raise red flags. Know that your favorite social network, bank, or
insurance company—basically any company that deals with sensitive
information—will never ask for your password or other personal data via email.
For more mobile security tips, follow

Mais conteúdo relacionado

Mais procurados

Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awarenessPhishingBox
 
Social Network presentation
Social Network presentationSocial Network presentation
Social Network presentationWailst
 
Go Viral on the Social Web: The Definitive How-To guide!
Go Viral on the Social Web: The Definitive How-To guide!Go Viral on the Social Web: The Definitive How-To guide!
Go Viral on the Social Web: The Definitive How-To guide!XPLAIN
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)a16z
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYJASHU JASWANTH
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanAhmed Musaad
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 

Mais procurados (20)

Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Google
GoogleGoogle
Google
 
Social Network presentation
Social Network presentationSocial Network presentation
Social Network presentation
 
Mobile security
Mobile securityMobile security
Mobile security
 
Go Viral on the Social Web: The Definitive How-To guide!
Go Viral on the Social Web: The Definitive How-To guide!Go Viral on the Social Web: The Definitive How-To guide!
Go Viral on the Social Web: The Definitive How-To guide!
 
Mobile security
Mobile securityMobile security
Mobile security
 
WhatsApp security
WhatsApp securityWhatsApp security
WhatsApp security
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Instagram
InstagramInstagram
Instagram
 
Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Whatsapp project work
Whatsapp project workWhatsapp project work
Whatsapp project work
 
Android vs Ios
Android vs Ios Android vs Ios
Android vs Ios
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 

Destaque

Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLookout
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notLookout
 
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsLookout
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overviewFabio Pietrosanti
 
Mobile Security
Mobile SecurityMobile Security
Mobile SecurityKevin Lee
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple AccountLookout
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Mobile security
Mobile securityMobile security
Mobile securityhome
 
Shifting Scientific Practice - ORCID 2015
Shifting Scientific Practice - ORCID 2015Shifting Scientific Practice - ORCID 2015
Shifting Scientific Practice - ORCID 2015Kaitlin Thaney
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneLookout
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber SecurityGeo Marian
 

Destaque (20)

Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Mobile security
Mobile securityMobile security
Mobile security
 
Shifting Scientific Practice - ORCID 2015
Shifting Scientific Practice - ORCID 2015Shifting Scientific Practice - ORCID 2015
Shifting Scientific Practice - ORCID 2015
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhone
 
Mobile security - Intense overview
Mobile security - Intense overviewMobile security - Intense overview
Mobile security - Intense overview
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 
NYU Talk
NYU TalkNYU Talk
NYU Talk
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 

Semelhante a 5 Ways to Protect your Mobile Security

Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application SecurityMarie Weaver
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxHAYDEECAYDA
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsNetLockSmith
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureHeimdal Security
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityCygnet Infotech
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaAnjoum .
 
West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10William Mann
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecureMedia Sonar
 
Working from home- How secure is it.pdf
Working from home- How secure is it.pdfWorking from home- How secure is it.pdf
Working from home- How secure is it.pdfFiyona Nourin
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!EMBplc.com
 
Protect Yourself and Your Devices.pdf
Protect Yourself and Your Devices.pdfProtect Yourself and Your Devices.pdf
Protect Yourself and Your Devices.pdftechit ltd
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudNordic Backup
 
Sept 2014 cloud security presentation
Sept 2014   cloud security presentationSept 2014   cloud security presentation
Sept 2014 cloud security presentationJoan Dembowski
 
Computer Security Case Study
Computer Security Case StudyComputer Security Case Study
Computer Security Case StudyPatricia Adams
 
InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsLiberteks
 

Semelhante a 5 Ways to Protect your Mobile Security (20)

Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application Security
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure
 
Working from home- How secure is it.pdf
Working from home- How secure is it.pdfWorking from home- How secure is it.pdf
Working from home- How secure is it.pdf
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Protect Yourself and Your Devices.pdf
Protect Yourself and Your Devices.pdfProtect Yourself and Your Devices.pdf
Protect Yourself and Your Devices.pdf
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Sept 2014 cloud security presentation
Sept 2014   cloud security presentationSept 2014   cloud security presentation
Sept 2014 cloud security presentation
 
Computer Security Case Study
Computer Security Case StudyComputer Security Case Study
Computer Security Case Study
 
InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security Tips
 

Mais de Lookout

The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatibleLookout
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidLookout
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go EvilLookout
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile DevelopmentLookout
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing PrivacyLookout
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring HackersLookout
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google AccountLookout
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone GuideLookout
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World CupLookout
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneLookout
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to MeasureLookout
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the OlympicsLookout
 
5 Types of Shady Apps
5 Types of Shady Apps5 Types of Shady Apps
5 Types of Shady AppsLookout
 
10 Beautiful Enterprise Products
10 Beautiful Enterprise Products10 Beautiful Enterprise Products
10 Beautiful Enterprise ProductsLookout
 
Hacking the Internet of Things for Good
Hacking the Internet of Things for GoodHacking the Internet of Things for Good
Hacking the Internet of Things for GoodLookout
 
What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?Lookout
 
Dragon lady
Dragon ladyDragon lady
Dragon ladyLookout
 
Dragon Lady
Dragon LadyDragon Lady
Dragon LadyLookout
 
History of Lookout
History of LookoutHistory of Lookout
History of LookoutLookout
 
Scaling Up Lookout
Scaling Up LookoutScaling Up Lookout
Scaling Up LookoutLookout
 

Mais de Lookout (20)

The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go Evil
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile Development
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing Privacy
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring Hackers
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your Smartphone
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the Olympics
 
5 Types of Shady Apps
5 Types of Shady Apps5 Types of Shady Apps
5 Types of Shady Apps
 
10 Beautiful Enterprise Products
10 Beautiful Enterprise Products10 Beautiful Enterprise Products
10 Beautiful Enterprise Products
 
Hacking the Internet of Things for Good
Hacking the Internet of Things for GoodHacking the Internet of Things for Good
Hacking the Internet of Things for Good
 
What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?
 
Dragon lady
Dragon ladyDragon lady
Dragon lady
 
Dragon Lady
Dragon LadyDragon Lady
Dragon Lady
 
History of Lookout
History of LookoutHistory of Lookout
History of Lookout
 
Scaling Up Lookout
Scaling Up LookoutScaling Up Lookout
Scaling Up Lookout
 

5 Ways to Protect your Mobile Security

  • 1. ways to protect your mobile security5
  • 2. As the world becomes more connected, security needs to be at the forefront of people’s minds as they use mobile devices to live every day life.
  • 3. By looking at insights into our behaviors on mobile devices, we can change those behaviors to keep our devices and data safe and private.
  • 4. 5 1 2 3 4 5 things to consider to protect your mobile safety: The silly things we do with our passwords The case for not jailbreaking/rooting your device The real story behind those software updates The problem with public Wi-Fi The ways we accidentally give over our information on mobile
  • 5. 5 1 2 3 4 The silly things we do with our passwords The case for not jailbreaking/rooting your device The real story behind those software updates The problem with public Wi-Fi The ways we accidentally give over our information on mobile
  • 6. It’s hard to remember the myriad of passwords we use for our accounts online.
  • 7. There are a number of ways we hear of people dealing with this, including writing them down on a piece of paper or using the same password across all your accounts.
  • 8. One of the most concerning practices we’ve heard of, however, is storing your passwords in your mobile contacts.
  • 9. One of the most concerning practices we’ve heard of, however, is storing your passwords in your mobile contacts. This is a definite DON’T DO in our books.
  • 10. I’m hiding them in there!
  • 11. I’m hiding them in there! One of the main justifications we’ve heard for storing your passwords as contacts is that you’re actually “hiding” them in there. Have you ever “hidden” a file in a file in a file on your PC in the hopes that it’d be hard for someone to find it? It’s a similar mentality.
  • 12. I’m hiding them in there! One of the main justifications we’ve heard for storing your passwords as contacts is that you’re actually “hiding” them in there. Have you ever “hidden” a file in a file in a file on your PC in the hopes that it’d be hard for someone to find it? It’s a similar mentality. But you’re not actually hiding them at all.
  • 13. There are tons of legitimate apps that access contact information.
  • 14. There are tons of legitimate apps that access contact information. Your social networks do it, your shopping apps do it, your health apps do it. Most of the time apps use your contacts in order to help you find friends or invite new people to the service. While the intentions are good, you might wind up sharing all of your passwords with the developers of the apps on your phone.
  • 15. There are tons of legitimate apps that access contact information. Your social networks do it, your shopping apps do it, your health apps do it. Most of the time apps use your contacts in order to help you find friends or invite new people to the service. While the intentions are good, you might wind up sharing all of your passwords with the developers of the apps on your phone. Suddenly, you don’t know how your passwords are being stored, who has access to them, and if the systems they’re living on are protected from attack.
  • 16. But seriously, remembering all those passwords is a chore.
  • 17. But seriously, remembering all those passwords is a chore. We get it, many people have upwards of 100 accounts online and you always hear the advice, “Use a different password for all your important accounts!” There are tools that can help. 1Password and LastPass are online password management tools that store all of your passwords and let you use one password across all of you accounts.
  • 18. But seriously, remembering all those passwords is a chore. We get it, many people have upwards of 100 accounts online and you always hear the advice, “Use a different password for all your important accounts!” There are tools that can help. 1Password and LastPass are online password management tools that store all of your passwords and let you use one password across all of you accounts. Of course, no system is perfectly secure and any time you store data online, you run the risk of losing that data. However, the benefit of storing your passwords in a safe, managed service hugely outweighs the risk of storing them in your contacts.
  • 19. 5 1 2 3 4 The silly things we do with our passwords The case for not jailbreaking/rooting your device The real story behind those software updates The problem with public Wi-Fi The ways we accidentally give over our information on mobile
  • 20. Jailbreaking your iOS device (or rooting in the case of Android) is tempting.
  • 21. After all, who wouldn’t want access to a whole new world of apps, easier international travel, and more control over their phone?
  • 22. If you’ve felt the lure to read the latest jailbreaking/rooting tutorial and take the plunge, you’re not alone: An estimated 7.5 percent of all iPhones — amounting to more than 30 million devices worldwide — are jailbroken. Jailbreaking is especially popular in China, where an estimated 13 percent of all iPhones are jailbroken.
  • 23. While we understand the temptation, we have one piece of advice: Unless you’re a pro, avoid jailbreaking.
  • 24. There are many security concerns you might not realize if you jailbreak / root your device.
  • 25. There are many security concerns you might not realize if you jailbreak / root your device. In many cases you may need to change some security settings on the device in order for the jailbreak to work. Those who don’t know what they’re doing, however, may not know how to properly reinstate security settings after the jailbreak is complete, leaving themselves open to attack.
  • 26. There are many security concerns you might not realize if you jailbreak / root your device. In many cases you may need to change some security settings on the device in order for the jailbreak to work. Those who don’t know what they’re doing, however, may not know how to properly reinstate security settings after the jailbreak is complete, leaving themselves open to attack. People with jailbroken phones will also readily download third-party apps. Though this is possible to do on non-jailbroken devices, it is much easier to accomplish in a jailbroken environment. Apps on a jailbroken device can also run with escalated privileges and access sensitive data belonging to other apps.
  • 27. There are many security concerns you might not realize if you jailbreak / root your device. In many cases you may need to change some security settings on the device in order for the jailbreak to work. Those who don’t know what they’re doing, however, may not know how to properly reinstate security settings after the jailbreak is complete, leaving themselves open to attack. People with jailbroken phones will also readily download third-party apps. Though this is possible to do on non-jailbroken devices, it is much easier to accomplish in a jailbroken environment. Apps on a jailbroken device can also run with escalated privileges and access sensitive data belonging to other apps. For example, the recent Keyraider malware impacted jailbroken iOS devices and stole 225k Apple accounts.
  • 28. It’s not just about security.
  • 29. It’s not just about security. Outside of security, there are many other reasons to be wary of jailbreaking or rooting your phone. For one, you’ll likely kiss any built- in customer support or warranty goodbye, which is problematic if you ever have a problem with your phone (and potentially out of several hundred dollars). It can also wreak havoc on battery life, and make your phone inoperable with future operating systems.
  • 30. It’s not just about security. Outside of security, there are many other reasons to be wary of jailbreaking or rooting your phone. For one, you’ll likely kiss any built- in customer support or warranty goodbye, which is problematic if you ever have a problem with your phone (and potentially out of several hundred dollars). It can also wreak havoc on battery life, and make your phone inoperable with future operating systems. So, to keep your phone safe and running optimally, stay far away from jailbreaking/rooting. It might be less fun coloring in between the lines, but it’s one of the best things you can do for your phone and data.
  • 31. 5 1 2 3 4 The silly things we do with our passwords The case for not jailbreaking/rooting your device The real story behind those software updates The problem with public Wi-Fi The ways we accidentally give over our information on mobile
  • 32. Updating your software is sometimes an inconvenience, but it’s also necessary to keeping up your mobile security hygiene.
  • 33. Sometimes updates require connecting to a power source, backing up data, or temporarily losing access to an app or service while the update processes. Whatever the reason, oftentimes we see that little tally of available updates increase and increase.
  • 34. The problem is, there are many critical security fixes that get pushed through these OS and app updates and when we ignore them, we leave ourselves vulnerable and open to attack.
  • 35. It just says “bug fixes” and feature upgrades, why should I care?
  • 36. It just says “bug fixes” and feature upgrades, why should I care? Those “release notes,” or the details that show you what you’re getting in a software update don’t often tell the whole story.
  • 37. Take, for example, these updates:
  • 38. These are real release notes in the “What’s New” section from apps affected by a piece of malware called XcodeGhost. The updates, though, just look like run-of-the-mill feature changes.
  • 39. Here you only see “Support for iOS 9.” This is vague and it doesn’t mention anything about security, but, in fact, the app had updated to get rid of the malware.
  • 40. Here you see a more detailed reference to, “Security issue caused by external malware affecting v6.2.5 was fixed in v6.2.6 and above.” This also references XcodeGhost and an update to get rid of the malware.
  • 41. You always want to be running on the most up-to-date software on your device.
  • 42. You always want to be running on the most up-to-date software on your device. In the security industry, when software is “patched,” that often means researchers can publish their findings — meaning bad guys and good guys alike suddenly have more information about vulnerabilities and other problems.
  • 43. You always want to be running on the most up-to-date software on your device. In the security industry, when software is “patched,” that often means researchers can publish their findings — meaning bad guys and good guys alike suddenly have more information about vulnerabilities and other problems. Releasing this information is a good thing because it helps security teams learn how to secure their software, but it also means that people need to download the latest patches to make sure they’re safe.
  • 44. 5 1 2 3 4 The silly things we do with our passwords The case for not jailbreaking/rooting your device The real story behind those software updates The problem with public Wi-Fi The ways we accidentally give over our information on mobile
  • 45. We’ve all been there: you’re running low on data, but you’re stuck in a really long line and want to check Facebook. Maybe you’re at the airport and realized you didn’t download that eBook for the plane.
  • 46. Unfortunately, connecting to and using that public Wi-Fi may be jeopardizing your data and privacy.
  • 47. Isn’t it fine if I’m only on there for a minute?
  • 48. Isn’t it fine if I’m only on there for a minute? When you use the Internet, you’re sending communications between computers. Accessing Facebook? Your phone is effectively talking to Facebook. The problem with public Wi-Fi is something called a “Man-in-the-Middle Attack,” whereby an attacker can sit on the Wi-Fi connection and eavesdrop on this conversation.
  • 49. Isn’t it fine if I’m only on there for a minute? When you use the Internet, you’re sending communications between computers. Accessing Facebook? Your phone is effectively talking to Facebook. The problem with public Wi-Fi is something called a “Man-in- the-Middle Attack,” whereby an attacker can sit on the Wi-Fi connection and eavesdrop on this conversation. In this attack, a person is able to listen in on an unprotected network, intercept your communications, and decrypt them (if they’re even encrypted in the first place) to read what you’re talking about.
  • 50. I don’t have anything interesting to say, so I’m safe.
  • 51. I don’t have anything interesting to say, so I’m safe. Downloading a book? You probably had to enter in your username and password. This counts as a communication that can be intercepted. Did you quickly enter your credit card information? That counts as well. Send off a last-minute work email that may have included sensitive info? That, too.
  • 52. I don’t have anything interesting to say, so I’m safe. Downloading a book? You probably had to enter in your username and password. This counts as a communication that can be intercepted. Did you quickly enter your credit card information? That counts as well. Send off a last-minute work email that may have included sensitive info? That, too. We oftentimes don’t realize the kind of information we access or input on our mobile devices, but these phones and tablets are with us all the time. They access all kinds of personal data we should want to keep close to the chest.
  • 53. Am I not supposed to use public Wi-Fi then?
  • 54. Am I not supposed to use public Wi-Fi then? In a way, yes. If you can avoid hopping on that free network, do. However, there are safe ways to surf the Internet while you’re on the go! Use your 4G/ LTE networks — they are much safer than public Wi-Fi. If you want to work at a coffee shop with free Wi-Fi, use a VPN to encrypt your traffic.
  • 55. Am I not supposed to use public Wi-Fi then? In a way, yes. If you can avoid hopping on that free network, do. However, there are safe ways to surf the Internet while you’re on the go! Use your 4G/ LTE networks — they are much safer than public Wi-Fi. If you want to work at a coffee shop with free Wi-Fi, use a VPN to encrypt your traffic. If all else fails, avoid any transactions over public Wi-Fi that may involve signing into an account, checking email, or paying for something. Your data will thank you for it.
  • 56. 5 1 2 3 4 The silly things we do with our passwords The case for not jailbreaking/rooting your device The real story behind those software updates The problem with public Wi-Fi The ways we accidentally give over our information on mobile
  • 57. Smartphones are small, portable and give us access to a world of information literally in our pockets.
  • 58. But mobile devices’ small form also means we interact with them pretty differently than desktop computers. In fact, studies have shown that users are 3x more likely to click on a malicious link from their smartphone than a PC!
  • 60. Enter, phishing We’ve all received phishing emails: they are typically designed to look like messages from banks, credit card companies, and similar organizations. The emails often have urgent subject lines requiring action to lure you to a phony website that looks—at least on a cursory glance—legitimate. Think: “Please verify your account” or “2nd Collections Notice.”
  • 61. Enter, phishing We’ve all received phishing emails: they are typically designed to look like messages from banks, credit card companies, and similar organizations. The emails often have urgent subject lines requiring action to lure you to a phony website that looks—at least on a cursory glance—legitimate. Think: “Please verify your account” or “2nd Collections Notice.” After clicking on the link and believing that you’ve landed on the organization’s actual website, you may enter in your username and password — unknowingly disclosing your private information to scammers.
  • 63. Tricky business While phishing isn’t new, it does have unique repercussions when you receive malicious communications on mobile — and attackers know this. For one, it’s hard to see if a link is actually legitimate. On a PC, you can hover over a link to determine if it will redirect to a suspicious looking address, but on mobile that’s not the case.
  • 64. Tricky business While phishing isn’t new, it does have unique repercussions when you receive malicious communications on mobile—and attackers know this. For one, it’s hard to see if a link is actually legitimate. On a PC, you can hover over a link to determine if it will redirect to a suspicious looking address, but on mobile that’s not the case. It’s also harder to spot if you’re on a suspicious website, if you do end up clicking through. For instance, if you’re on a large monitor you may pick up on a URL reads “usbanki.com” instead of “usbank.com,” but on a mobile device it is much more difficult to spot this distinction. On PC you can also look for the “HTTPS” at the front of a URL, indicating that it is using a secure connection, but this is also not immediately evident on mobile where you have to click on the address bar and scroll to the front of the URL to determine if the site uses HTTPS.
  • 65. Tricky business While phishing isn’t new, it does have unique repercussions when you receive malicious communications on mobile—and attackers know this. For one, it’s hard to see if a link is actually legitimate. On a PC, you can hover over a link to determine if it will redirect to a suspicious looking address, but on mobile that’s not the case. It’s also harder to spot if you’re on a suspicious website, if you do end up clicking through. For instance, if you’re on a large monitor you may pick up on a URL reads “usbanki.com” instead of “usbank.com,” but on a mobile device it is much more difficult to spot this distinction. On PC you can also look for the “HTTPS” at the front of a URL, indicating that it is using a secure connection, but this is also not immediately evident on mobile where you have to click on the address bar and scroll to the front of the URL to determine if the site uses HTTPS. Even incredibly tech-savvy people can fall prey to these schemes. The result? Your sensitive information gets in the hands of attackers who will likely use it for their gain.
  • 66. Don’t get phished — get savvy
  • 67. Don’t get phished — get savvy To avoid getting phished on mobile, the best thing is to avoid clicking on email messages and links that just don’t look right. Messages requesting your password, login details, or other important financial information should especially raise red flags. Know that your favorite social network, bank, or insurance company—basically any company that deals with sensitive information—will never ask for your password or other personal data via email.
  • 68. For more mobile security tips, follow