Category List


Tag List


Tag Cloud



Archive

2013

2014

Mobile Security

February 05, 2013 at 9:33 AM

Mobile Security

 While computer security experts and companies have been busy providing measures to keep our laptops and desktop PCs secure, the bad guys have been busy creating new ways to threaten the security of emerging mobile devices.

 According to Google, 56% of smartphone users access the Internet at least once daily from their smartphone, 70% do so to use email and 51% to use search engines.

With this increasing usage of mobile devices, it’s no wonder cybercriminals are now creating malicious software for mobile devices.

  

What To Look For

 If you want to protect your identity and the data stored on your phone, then you’ll want to choose a reliable, mobile protection package that offers the following features:

 Must-have—real-time, proactive protection from the unknown and on-demand protection of all information and communications, including Wi-Fi, Bluetooth, GPRS, EDGE and Infrared.

 Must-have—protection that monitors all incoming and outgoing communication to prevent hackers from stealing your personal data.

 Must-have—low CPU use, low memory requirements and compact updates that preserve battery life and minimize data use.

 Must-have—find and protect your phone if lost or stolen.

 Nice-to-have—customizable spam features that allow you to define trustworthy contacts via a customizable blacklist or whitelist, or simply block unwanted text and multimedia files from unknown numbers.

  

Precautions

 The problems that have plagued your PC like viruses, malware and identity theft are now migrating to the mobile world, so you’ll need to take the right precautions to secure your Android phone.

 What about iPhone and iPad users? According to Forbes.com and Apple, as long as iPhone users don’t jailbreak their phones then the chances of getting a malicious app are extremely slim because “much of the system is based on industry-standard secure design principles—and in many cases, Apple has done additional design work to enhance security without compromising usability.” 

Combine this meticulous design with a heavily policed download site like Apple iTunes and you have a winning formula for a secure mobile platform…for the moment. Only time will tell if these security measures will keep Apple mobile products safe. We’ll have to keep an eye on this one to see if cybercriminals target growing Apple products.

 Want to read more about mobile security threats, follow this link.



Tags:
Category: Featured Stories

Marc Arellano

user_avatar

Marc Arellano teaches communication at Okanagan College in British Columbia, Canada. He has worked as a technical writer, editor and copy writer.His current academic interests focus on computer-mediated communication and the effects of new media on culture.

Marc Arellano enseigne les communications au Collège de l'Okanagan en Colombie-Britannique. Il a travaillé en tant que rédacteur, éditeur et concepteur-rédacteur. Ses intérêts académiques actuels mettent l'emphase sur la communication au moyen d'un ordinateur et sur l'effet des nouveaux médias sur la culture.


Please add a comment

You must be logged in to leave a reply. Login »