Thursday, January 21, 21:27
Home security 5 Biggest Mobile Security Threats! (2019 edition)

5 Biggest Mobile Security Threats! (2019 edition)

Hackers are increasingly sophisticated, especially with mobile devices. Let's look at the most dangerous security threats that can harm our cellphone, especially if we use them in the business we work in or are corporate.

  1. Fake public Wi-Fi networks

One of the most attractive ways hackers exploit the vulnerabilities of mobile devices is through fake wireless networks. Although Wi-Fi is good, especially if it's a secure private network, users will be incorrectly connected to public Wi-Fi without regard to risk. Sometimes, a public Wi-Fi network may seem trustworthy, but it's actually designed to attract users to the network. Even when users are aware of the risks of these unsecured networks, 80% still connects to them.

This practice is particularly worrying given the recent trend of employees accessing corporate applications on personal devices. To avoid disrupting an organization, there should be a strong mobile policy that restricts employees' access to business data through public Wi-Fi.

  1. Malware-Ridden Applications

There are many types of mobile malware and ways that hackers mislead users to become infected. 2019, some mobile applications represent one of the potential threats they carry malware.

Often, at times, employees download applications to their mobile phones that they consider to come from trusted companies. However, the applications really are false applications disguised as legitimate and of course contain malware. Users probably don't understand it, but they still download it, enter their personal information, and are infected with malware.

There have been thousands of cases of malware online, and some of them have millions of downloads. A recent report found that attacks by so-called fake applications have increased by 300%. Businesses should prevent employees from downloading applications from untrusted sources.

mobile

  1. Data leakage

Mobile devices are prone to data leakage and hackers are trying to take advantage of it. The hard part about data leakage is that there could be multiple causes for it. Sometimes, corporate mobile applications can be "leaky". There are also personal applications who inadvertently transmit in person or corporate data to a remote server. Employee negligence (or the case of a disgruntled employee) is sometimes the fault, with employees sending electronically sensitive data to a recipient outside the organization or transferring business data to a public cloud instead of a private cloud.

Data leakage is one of the biggest threats to 2019's mobile security, and businesses must be equipped with the right tools to prevent it. Some solutions allow organizations to interrupt processes in applications that lead to data leakage. Other organizations limit the permissions for applications or certain files to limit data leakage.

  1. SMiShing (SMS - Phishing)

Hackers have relied on phishing scams to steal personal and business data. A common example includes fake emails where users reveal incorrect details, leading to the theft of sensitive information.

On mobile devices, phishing scams are taking shape SMS or text messages that trick users into revealing details, such as passwords. Known as SMiShing, this means that users receive a message urging them to call a phone number. When the user calls, the phone data is easily exported. Both the user and the organization may not even be aware of the breach, especially if there is no security software used on the mobile device.

The best defense from SMiShing is to train users not to receive or make calls to unknown numbers that send text messages to their cellphone, especially if the phone number looks suspicious.

  1. Cryptojacking

As one of the fastest growing mobile security threats in 2019, cryptojacking is so new that there is a good chance that some mobility leaders may not know it. Cryptojacking involves them hacker exploiting someone else's device for cryptomining. In the meantime, the user is of course not aware that this is happening on his mobile phone.

The device's so-called cryptomining affects technology and could reduce the battery life and overall performance of the device. It can also cause overheating and physical damage to the appliances. Since many employees depend on their cellphone for work, this is very worrying.

Cryptojacking started with malicious mining applications, though these applications have been banned from stores. However, mobile websites could be the next target. There is not a strong solution for encryption, so businesses should train employees to avoid suspicious websites and applications.

security threats

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Teo Ehc
Teo Ehchttps://www.secnews.gr
Be the limited edition.

LIVE NEWS

Mac: How to see which model you have and when it was released

When you need support for your Mac - or want to install some kind of upgrade - you usually need to know the exact ...
00:02:35

Bill Gates: Will he work with Biden on COVID-19 / climate change?

Microsoft co-founder Bill Gates said on Twitter that he is looking forward to working with the new US President, Joe Biden, and ...

What are the rumors circulating about the iPhone 13?

Apple iPhone 13 will have a redesigned Face ID system that will have a smaller notch at the top of the screen, ...

Biden: How was the political transition in the US captured on social media?

As Joe Biden was sworn in as President of the United States, this important political transition was captured on popular social media. On January 20, ...

CentOS ceases to be supported but RHEL is offered for free

Last month, Red Hat caused a great deal of concern in the Linux world when it announced the discontinuation of CentOS Linux.

Microsoft Office 365 employee passwords leaked online!

A new large-scale phishing campaign targeting global organizations has been found to bypass Microsoft Office 365 Advanced Threat Protection (ATP) and ...

COSMOTE and Microsoft provide new cloud solutions for businesses

COSMOTE and Microsoft expand their cooperation, offering even more advanced and high quality cloud solutions, in large and small ...

Cyber ​​attacks in Eastern Europe are on the rise!

The cyber-attacks that have taken place in many US government agencies and companies in recent months have caused concern in the developing countries of ...

Tesla reduces the prices of the Model 3 in Europe

Tesla has reduced the prices of the Model 3 in many European markets, which reductions could be partly linked ...

iOS, Android, XBox users in the crosshairs of a new malvertising campaign

Recently a new malvertising campaign was discovered that targets users of mobile and other connected devices and uses effective ...