• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • About
    • Secure360
    • UMSA
    • Get Involved
  • Events
    • Secure360 2021
    • Student360
    • Past Events
      • 2020 Secure360 Twin Cities
      • 2020 Student360
      • 2019 Secure360 Twin Cities
      • 2019 Student360
      • 2018 Secure360 Twin Cities
      • 2018 Secure360 Wisconsin
      • 2018 Student360
      • 2017 Secure360 Twin Cities
      • 2017 Student360
      • 2016 TC Secure360 Conference
      • 2015 Secure360 Conference
      • 2014 Secure360 Conference
      • 2013 Secure360 Conference
        • 2013 Secure360 Conference Speaker Presentations
      • 2012 Secure360 Conference
  • For Sponsors
    • Secure360 Twin Cities
    • Student360 Sponsors
  • For Speakers
    • Secure360 Speaker Details
    • Student360 Speaker Details
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

The top 4 mobile security threats

October 20, 2016 by Secure360 and UMSA

top mobile threats

Copyright: 123rf

Your phone doesn’t leave your side—you use it to navigate, stay in touch with your friends and network, order your next meal and pay your bills. According to PC Magazine, by 2020, global smartphone subscriptions will more than double to 6.1 billion, 70 percent of people will use smartphones, and 90 percent will be covered by mobile broadband networks. As our mobile phones are being incorporated into every aspect of life and used by nearly everyone, it is important that we are also aware of the rise in threats to mobile security.

Here is a look at the top 4 mobile security threats:

1. Terrorism threats with mobile

Terrorism attacks have been trending towards telegram and Redphone-type communication apps that use end-to-end encryption to avoid eavesdropping by military or law enforcement. In addition, there has been usage of apps that criminals are using to communicate with each other for a very temporary time period, making their communication hard to track. Terrorists will likely also leverage major online media services for secret communications via hidden data in videos — for example, special audio frequencies that cannot be heard/understood by humans but are translatable through specific programs.

2. Mobile payment services

This threat likely does not come as much of a surprise, but with continued growth in mobile payment services and apps, we may see services such as Apple Pay or Samsung Pay compromised in the next couple years. This will potentially happen through identification of vulnerabilities, leading to credit card information fraud, extortion, and unauthorized use. In addition, peer-to-peer mobile payment apps that use simple payment remittance processes will become more vulnerable to hackers attempting to transfer funds from users’ accounts to dummy accounts they can then access.

3. Mobile web browser-based hacks

Hacking through mobile browsers is one of the most efficient ways to compromise the entire phone. Exploiting browser vulnerabilities can enable the hacker to bypass its many system-level security measures. In many cases, webkit-based exploits will allow hackers to bypass a browser’s sandbox, or the security measures built into modern browsers.

4. Device hijacking or eavesdropping

Many smartphones include preloaded applications that are not validated by mobile security teams or allow customizable features, exposing them to remote device hijacking. Smartphone owners are often not practicing security habits with their device, often allowing their device to automatically access unsecured WiFi connections that don’t encrypt data communicated through the network. Another concern is the ability of a hacker to eavesdrop on conversations or view messages that a user sends or receives.

While mobile phones are making our lives easier, it is important that users are aware of the potential threats that can arise and taking security precautions when using their phones in public areas. Employees should be continued to be educated on the security issues that can arise through mobile usage to ensure that mobile devices are not becoming an open door for hackers into the organization’s systems.

Filed Under: Cybersecurity

About Secure360 and UMSA

The Secure360 and UMSA team is made up of professionals in the security and risk management industries. Topics of expertise range from physical security, IT, risk management, cybersecurity, cloud, information security and records management.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Categories

  • Uncategorized
  • Guest Posts
  • Business Continuity Management
  • News and Events
  • Physical Security
  • Cybersecurity
  • Professional Development
  • Risk and Compliance

latest tweets

  1. Marketing Envy
    Marketing Envy: [New Blog] 2020 saw in-person conferences evaporate, but with vaccines rolling out, 2021 could be different. H… https://t.co/4YONwZNsDa
    about 4 days ago

  2. Secure360 Conference
    Secure360 Conference: We are honored to be listed on the Top 20 Cyber Conferences for 2021 -> https://t.co/MnrQ3E5ifw
    about 5 days ago

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2021 Secure360. All rights reserved.