Guest Post – Cybercriminals Like Going Mobile Too

It’s something that we hear a lot about – mobile devices have become an integral part of our society. Can you remember the last time that you switched your phone off for the weekend? Can you even imagine not having your phone with you all the time? If you’re like most people, the idea is ludicrous. We keep everything on our phones.

It’s convenient for us – you don’t have to boot up a laptop or desktop every time you need to go online.

Unfortunately, our dependence on mobile devices is something that cybercriminals are cashing in on big time. According to Symantec, we’ve been seeing a year-on-year growth in mobile hacks. The number of attacks grew by 54% from 2016 to 2017.

Why Mobile in Particular?

Mobile phones might prove easier to hack than a laptop, partially because of outdated software. Symantec found that only one-fifth of the Android phones on the market today are running up to date version of the Android OS.  By not updating phones regularly, users are missing out on crucial security updates that could prevent malicious attacks.

Hardware from Different Designers Could Have Flaws

Then there’s the problem with the number of different devices that are being manufactured. Some mobile phone manufacturers, like Samsung, take steps to ensure that their devices are better protected. Not all manufacturers are quite as diligent.

Apps are Problematic

Head off to any of the app stores, and you’ll find millions of apps to download. Not all of these are great, and some might be hiding a nasty surprise. Here’s an eye-opener for you — 24,000 malicious apps are blocked from the major app stores a day.

There is also some debate over which of the major operating systems is more secure — Android or iOS. In this case, iOS wins because the system won’t allow you to download an app from an unknown source.

The statistics are also not in Android’s favor. The overall number of new samples of potentially unwanted applications almost doubled between 2015 and 2017.

These apps are not strictly classified as malware, because they’re not designed to be malicious. However, they might result in the phone performing unwanted functions, or they might have an ulterior motive behind their creation.

Third-Party Apps are a Real Problem

Back to Symantec again. Its Internet Security Report 2018 lays it out clearly — 99,9% of malware is hosted by third-party app stores. That is, outside of the big stores like Google Play and the Apple Store.

So before you take up that huge discount on an expensive app from a third-party provider, just keep in mind that you might get a lot more than you bargained for. Cybercriminals often make copies of more popular software available at low costs or for free in these app stores. The problem is that they’ll also add some form of malware.

Final Notes

Your phone is also a target for cybercriminals. You have to be just as vigilant when it comes to smartphones as you would be with your computers.

Infographic URL: https://techjury.net/stats-about/cyber-security/

0

About the Author:

I am a cybersecurity and IT instructor, cybersecurity analyst, pen-tester, trainer, and speaker. I am an owner of the WyzCo Group Inc. In addition to consulting on security products and services, I also conduct security audits, compliance audits, vulnerability assessments and penetration tests. I also teach Cybersecurity Awareness Training classes. I work as an information technology and cybersecurity instructor for several training and certification organizations. I have worked in corporate, military, government, and workforce development training environments I am a frequent speaker at professional conferences such as the Minnesota Bloggers Conference, Secure360 Security Conference in 2016, 2017, 2018, 2019, the (ISC)2 World Congress 2016, and the ISSA International Conference 2017, and many local community organizations, including Chambers of Commerce, SCORE, and several school districts. I have been blogging on cybersecurity since 2006 at http://wyzguyscybersecurity.com

Add a Comment


This site uses Akismet to reduce spam. Learn how your comment data is processed.