Tag

cyber attacks

Browsing

By Dr. Jacqueline Gutierrez
Faculty Member, School of STEM at American Military University

As we continue to depend on mobile devices daily for everything from work and gaming to social media, our security concerns continue to increase. However, many users do not seem to be concerned with or even contemplate the security concerns associated with using a mobile device. In fact, most feel that surfing the Web on their phone is safer than from their computer. They also typically store sensitive data on their devices, including personal contact information and passwords.

There are various ways in which a cyber-attack can occur on a mobile device.

The simplest way is having your device stolen. Even with password protection, a sophisticated hacker can easily defeat the security features on a mobile device and gain access to all pertinent information.

Cyber-Attacks on Phone Apps

Apps are another way a hacker can gain access to your device. Some service providers even offer third party apps with no overall safety evaluation. While not all third party apps are bad, they are the less safe option. The best thing to do is use an app that already has a positive reputation.

Web-Based Threats

Phishing scams are one form of Web-based threat which can include links to websites designed to trick you into providing personal information such as passwords and bank account information. These sites typically look very similar to those you would normally use such as banking sites. Drive- by downloads are also a concern and can happen automatically when you visit a Web page. In some cases, the download action will occur as soon as you access the site. Browser exploits are another form of Web-based threat which includes software that is launched in your browser. Some examples include Flash player or PDF reader.

Network Exploits

Mobile devices are just as vulnerable to network threats as desktop computers. One example is network exploits, which take advantage of flaws in mobile operating systems or software operating on local or mobile networks and can install malware on your device without you knowing. Wi-Fi sniffing is another form of network threat. If an application or web page does not use proper security measures, unencrypted data sent across the network can be easily read by someone grabbing data in transit.

With so many ways to access one’s data on a mobile device there have to be ways to ensure their protection. The following are some simple steps to do so:

  1. Update your device with the latest security feature or recommended update. These available updates are sometimes crucial to ensuring that your device is not vulnerable to security threats.
  2. Use mobile security software and keep it updated. These programs can provide many benefits including locating a missing or stolen phone, backing up your data, and remotely wiping all data from the phone if it is reported stolen.
  3. Always secure your mobile device with a password or PIN. Make sure it is unique and not something that someone could easily figure out, such as your birth date.
  4. Do not download any apps without first doing some research to ensure that the app you are downloading is valid and safe. If the download is not from an app store or a trusted organization, it is best to avoid it. Another rule of thumb is to understand the terms of use. If an app asks for too much personal information, it is best to avoid it.
  5. Be careful with free WIFI hotspots. It is best to avoid logging into personal accounts while using free WIFI since you really don’t know how secure a WIFI network is. It is safe to say that most WIFI hotspots are not safe.
  6. Make sure to back up the information on your phone. Most people tend to keep all of their family and friend contact information in their phone. If your phone is lost or stolen you will lose all of your information which can be both upsetting and hazardous.

Things to consider before your mobile device is lost or stolen include: being aware of your surroundings, locking your phone, adding apps that will track, lock or erase personal information, saving your data, and insuring your phone through your provider or a third party.

Additional things to consider if your mobile device is lost or stolen:

  • Report it to your wireless provider to avoid incurring usage charges. You may also report it to your local police department.
  • If you have installed a tracking app, activate it.
  • Remote lock your device so your personal information cannot be accessed.
  • Erase all information from your phone with the use of the app you previously installed. There are various apps that can help locate, lock and or erase your wireless device if it is lost or stolen.

It is a good idea to check with your service provider or to conduct some research to determine which app may be best for your mobile device.

The best advice I can provide is to be cognizant of possible cyber-attacks on your mobile device to help prevent them from occurring.

 

About the Author:
Dr. Gutierrez has several years of experience in Information Technology, and in management. She has a Master of Science in Computer Information Systems, and a Ph.D. with a concentration in organizational leadership. Her professional experience includes working in both the private, and the public sector. She served as a Deputy Director for a team of cyberwarfare administrators which maintained over 300 systems worldwide for the Air Force Computer Emergency Response team. She was the lead for the development of Host Based Security operating procedures for the Air Force. She also served as a Quality Assurance Personnel (QAP) providing contract oversight for various organizations to include: McAfee, Northrup Grumman, General Dynamics, Joint Task Force Global Network Operations (JTF-GNO) and various other DoD departments.

By William Tucker
Chief Correspondent for In Homeland Security

In essence, the public nor the government overreacted to Wednesday’s cyber anomalies when there was, and still is, talk of an attack. As with man-made or natural disasters it’s not uncommon to see the same agencies playing the role of first responder. Regardless of the cause of the incident, many of the same issues will be present, but the biggest difference between the two will be the collection of evidence, how that evidence is used, and what it’s used for. 

By Rick Whitman
Special Contributor to In Homeland Security

Over the past decade, the number of security breaches seems extraordinary. Trade magazines and Congressional testimony reveal both the extent of cyber attacks and the growing concerns about both the quantity and the sensitivity of information losses. To date, these losses include personal information, business practices, trade secrets, and even government secrets.

By Amanda Vicinanzo
Senior Editor of Homeland Security Today
Special to In Homeland Security

Just days after the FBI alerted U.S. businesses to be on the lookout for malicious malware like the kind that took down the internal network of Sony Pictures, the Department of Justice (DOJ) announced plans to create a cyber crime unit to advise on electronic surveillance in cyber investigations and work with the private sector to prevent online crime.

Cyber security and data privacy remain a hot topic as Facebook prepares to go public today with its initial public offering.Jeremiah Grossman, a world-renowned expert in Web security and co-founder of the Web Application Security Consortium, says that Facebook will need to be even more concerned about cyber attacks since any type of attack might (temporarily) impact its stock price.