• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Student360
  • About
    • Secure360
    • UMSA
  • Secure360 2022
  • For Sponsors
  • For Speakers
  • Get Involved
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

The top 4 mobile security threats

October 20, 2016 by Secure360 and UMSA

top mobile threats

Copyright: 123rf

Your phone doesn’t leave your side—you use it to navigate, stay in touch with your friends and network, order your next meal and pay your bills. According to PC Magazine, by 2020, global smartphone subscriptions will more than double to 6.1 billion, 70 percent of people will use smartphones, and 90 percent will be covered by mobile broadband networks. As our mobile phones are being incorporated into every aspect of life and used by nearly everyone, it is important that we are also aware of the rise in threats to mobile security.

Here is a look at the top 4 mobile security threats:

1. Terrorism threats with mobile

Terrorism attacks have been trending towards telegram and Redphone-type communication apps that use end-to-end encryption to avoid eavesdropping by military or law enforcement. In addition, there has been usage of apps that criminals are using to communicate with each other for a very temporary time period, making their communication hard to track. Terrorists will likely also leverage major online media services for secret communications via hidden data in videos — for example, special audio frequencies that cannot be heard/understood by humans but are translatable through specific programs.

2. Mobile payment services

This threat likely does not come as much of a surprise, but with continued growth in mobile payment services and apps, we may see services such as Apple Pay or Samsung Pay compromised in the next couple years. This will potentially happen through identification of vulnerabilities, leading to credit card information fraud, extortion, and unauthorized use. In addition, peer-to-peer mobile payment apps that use simple payment remittance processes will become more vulnerable to hackers attempting to transfer funds from users’ accounts to dummy accounts they can then access.

3. Mobile web browser-based hacks

Hacking through mobile browsers is one of the most efficient ways to compromise the entire phone. Exploiting browser vulnerabilities can enable the hacker to bypass its many system-level security measures. In many cases, webkit-based exploits will allow hackers to bypass a browser’s sandbox, or the security measures built into modern browsers.

4. Device hijacking or eavesdropping

Many smartphones include preloaded applications that are not validated by mobile security teams or allow customizable features, exposing them to remote device hijacking. Smartphone owners are often not practicing security habits with their device, often allowing their device to automatically access unsecured WiFi connections that don’t encrypt data communicated through the network. Another concern is the ability of a hacker to eavesdrop on conversations or view messages that a user sends or receives.

While mobile phones are making our lives easier, it is important that users are aware of the potential threats that can arise and taking security precautions when using their phones in public areas. Employees should be continued to be educated on the security issues that can arise through mobile usage to ensure that mobile devices are not becoming an open door for hackers into the organization’s systems.

Filed Under: Cybersecurity

About Secure360 and UMSA

The Secure360 and UMSA team is made up of professionals in the security and risk management industries. Topics of expertise range from physical security, IT, risk management, cybersecurity, cloud, information security and records management.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Categories

  • Uncategorized
  • Guest Posts
  • Business Continuity Management
  • News and Events
  • Physical Security
  • Cybersecurity
  • Professional Development
  • Risk and Compliance

latest tweets

  1. Secure360 Conference
    Secure360 Conference: With so much fun had this year, we're eager for next year! Mark your calendars for May 9-10, 2023 back at Mystic La… https://t.co/Cbk0abnNSO
    about 12 hours ago

  2. Secure360 Conference
    Secure360 Conference: With #Sec360 2022 officially in the books, we wanted to share a little recap of the fun! https://t.co/iMPwAp1Kac … https://t.co/kk7xRUXoRo
    about 3 days ago

  3. Fusion Learning Partners
    Fusion Learning Partners: Congratulations @UMSAOrg on a successful 2022 #Secure360 event! We are honored to be part of your conference team &… https://t.co/RbT7IEG49G
    about 3 days ago

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2022 Secure360. All rights reserved.