Security of the smartphone: Today and tomorrow

With the smartphone industry growing bigger every day, there is growing concern for data security on the aforementioned mobile phones. The power of these devices is always increasing, like the amount of software that can be installed on them. With the advent of these different types of software, including financial software and personal software, the need for greater security is necessary. Most of these devices come with some kind of security built-in, but is it good enough for the world today?

For most people nowadays, their entire life is on the smartphone. It contains a plethora of personal information and data such as:

      Personal / Working Documents, Notes, Images, and Emails That Can Keep Sensitive Information
    • Full Access to Wi-Fi Networking You Connect to Workplace or Home
    • Calendar Subscriptions and Contacts
    • Various Pages / Information Through applications such as social networking applications, billing applications, movie shows, retailers, etc.

    With all this information on our smartphones, it makes it a gold mine for potential thieves. The risk that your phone is lost, stolen or even bred by your IT boy is only half the security problem with them. Smartphones can also leak other types of data by sniffing your internet when connected to Wi-Fi networks. Your keywords on unsecured sites and services, such as Facebook, Twitter, Web sites, POP3 email services, etc. Can be easily beat by someone else online. There is also a case of viruses, malware, SMS / MMS exploits and Bluetooth utilization; These utilities can change your phone and prevent you from using certain features, sending information or calling a phone call, stealing and / or destroying personal information on your phone or making the phone unusable.

    While the biggest concern, now that there should be more emphasis on protecting your phone from theft or loss or sniffing over Wi-Fi, the issues of malicious software and hackers are becoming increasingly common every day. These numbers could be more worrying in the near future because of the lack of integrated active security systems such as firewalls, anti-virus programs, and malware applications on our phone.

    To set a little background for the importance of securing your mobile network, Juniper Networks researched more than 6,000 smartphones and tablets in 16 countries about security threats on mobile phones. They found the following:

    • 250% increase in mobile phone software last year
    • Fortune 15 company found that 1,250 of its 25,000 devices were infected with malware
    • 44% of respondents surveyed using their devices for both business and personal use [19659004] 80% acknowledge using their devices to access their work network without knowing or allowing an employer
    • one in twenty applications on the Android Market request permissions that could allow the app to make a call without the user knowing [19659004] Nine out of ten mobile phones have little or no security protection
    • More than 60% of reported smartphone infections are spyware and 17% are religious messages with text messages that can set up fees charged by owner of the owner

    As apparent from the results of Juniper, it is necessary to get more mobile security. Luckily, there are several options to ensure the security of the phone that is built into the operating system and several third-party applications as well. Even basic security measures can help you protect your personal information. To get started, we'll start with some simpler protection devices.

    While this first may seem obvious and obvious, do not miss your phone! If you are in a public place, do not sit down or put it in a pocket or open a bag, which is easy to grab. This is actually the most common way of losing or stolen the phone.

    You should also set the phone to close or time after a certain time (recommended thirty seconds or less), especially if you have to leave your phone at your desk at work or in other public areas. All major smartphones come with this functionality built-in. You will want to make sure you choose something that is not easy for anyone to guess, but easy for you to remember. There should be nothing as simple as your address, name, phone number, etc. Here's how to configure timed settings and passwords on your phone:

    Android :

    Starting with Android 2.2 (Froyo), users can install a password lock, PIN or password on your device . Users of previous versions of Android can only configure a lock lock. How to adjust the time and the clocks described above may vary depending on the manufacturer of your phone. This option is usually found by pressing the Menu Menu from the Home screen, navigate to S enings Location and Security and Install Lock . From here you should be able to easily install different types of locks on the screen. ( Warning Notification : Make sure you have your Gmail account linked to your phone so that you can access your phone if you forget your password. You set up a lock lock, as it can be very easy to forget your pattern). You may also want to be careful by installing a locking mechanism, such as locking the phone in this way, leaving an oil residual on the screen that can continue, even if you dry it. A study by researchers at the University of Pennsylvania on the Google Nexus One and HTC G1 showed taking pictures of the phone with a standard camera and making simple treatments for the images within the image processing software showed a pattern of more than 90% of the time.

    BlackBerry :

    Press the BlackBerry key, enter Options and Password . From there, select Enable Password . Set the number of password attempts to which you consider the appropriate amount (recommend four minutes). After the specified amount of attempts have been exceeded, it will completely lock you off your phone by the time specified in the Security Deadline field. You can also set it as it will lock when you insert BlackBerry into a capsule. This will only work with magnetized holster. To set the display time, return to the screen Options and select Display / Keyboard . Then select a certain time period after Duration of period .

    iPhone :

    Originally with iOS 4, Apple introduced the ability to set a password as well as the standard 4 digit PIN. To set a password, go to Settings General and Password Lock . From there, enter the password or PIN you want, as well as set the display time through the Auto-Lock option. You can also select the option Delete data to delete all data in your phone after 10 password attempts.

    While password protecting your phone can significantly reduce the risk of your information stolen, it is always good to take even more precautions. There are several different types of security packages available from different vendors, as well as embedded software that can perform "remote wipe" on the phone if it is lost or stolen. Remote drying means you can completely remove all your data from your phone, including email, text, documents, contacts, etc. on the internet. For those users who use a Microsoft Exchange email account, this can easily be achieved without third-party software. You can either do it yourself through the Options panel in Outlook Web Access or anyone in the IT department has wiped. For those who are personal users or for non-stock exchanges, there are several other options from third party vendors.

    Android / BlackBerry :

    There are several different third-party applications that allow you to remove your device remotely, as well as provide some other security features. The most popular application now is the Lookout Mobile Security suite. It not only allows you to remove your device remotely, but also additional features that allow you to monitor your device with GPS, copy your network connection and scan for viruses. The actions mentioned above (minus remote wipes) are available through their free version. Premium version of the application includes all of the above-mentioned features as well as additional support for call history and images, remote control and includes a privacy counselor. The privacy counselor gives you insight into which applications can access personal information on your phone, as well as scan any application you download to see what data is available. The premium version is $ 2.99 / month or $ 30 / year. Some competitors in Lookout Mobile Security also offer protection against web threats by scanning applications before they are installed, scanning links for web site URLs and other malware and blocking unwanted calls and text messages.

    iPhone :

    iPhone does not have as many features as other platforms. The only option is to monitor your phone using MobileMe. If your iPhone has iOS 4.2 or higher, you can simply download the Find Phone app from the App Store and activate it online through MobileMe. If you lose your phone, you can sign in to MobileMe's website and track your phone. If you have an older version of iOS, you'll need to have a paid MobileMe account, which costs $ 99 / year.

    In the case of anti-virus protection on the iPhone, no one is available at the consumer level. Apple strictly builds on the App Store's strict review process to deal with malicious software. While this sounds good, it's not foolish. With so many programs going through the approval process, there has to be some malicious ones that get through. The only other kind of protection available to iPhone is Trend Smart Surfing, which prevents access to web pages with malicious content and helps circumvent web attacks.

    Juniper Networks, however, operates on the Juno Pulse Mobile Security Suite that contains anti virus, firewall, anti-spam and remote control / monitoring device. It also supports remotely and retrieves data and can detect lost devices. Juno Pulse is only available to customers of the company but they are looking to move into the consumer market.

    Some other general safeguards you can take to protect yourself are to ensure that when you install third-party applications, you pay attention to the privileges you give them. Some of these privileges may include access to your GPS location, access to your contacts, access to your text messages and other personal information. With the BlackBerry App World and Apple App Store, most of these issues are handled at application level before they are released to the masses. However, the Android Marketplace is a bit different, since Google does not monitor all applications that come into it. It gives the end user more freedom, as the application asks you for certain permissions when you install and update them. In short, it is best to use common sense and to monitor what you are setting up before setting up read-out reviews and make sure it has a good number of users before. Make sure you only download applications from trusted sources. There are no other precautions that you should use when installing programs on your computer.

    Other factors that guarantee your device that you should pay attention to are that when you sign in to a website, ensure that the connection is encrypted with SSL or HTTPS. You should also use secure Wi-Fi hotspots that encrypt your traffic from others who make use of the network. If you can not do this, you should choose to use a mobile data connection instead as it is usually encrypted by your network operator. You can also use VPN to secure your entire traffic, as there are several free providers out there, including Hotspot Shield or WiTopia.

    Device encryption is also necessary for mobile users, as it will secure your personal information and data from being recovered by hackers or other advanced users.

    BlackBerry :

    Most of the new BlackBerry devices support encryption on the entire device and removable storage (microSD cards) -This will protect your photos, documents and other files if you lose BlackBerry or have Someone took your card out when you're not looking. When you encrypt the device, you can encrypt your contacts, because encryption will not display the dialing names when the phone is locked. To install device encryption and / or removable storage, press the BlackBerry key, go to Options Security and Encryption . From here you can specify what you want to encrypt.

    iPhone :

    Encryption on iPhone is automatically turned on when you insert a password on your device. However, it is only available on iPhone 3GS and later. It is not available on previous iPhone models. To ensure that encryption is enabled, make sure that Data protection is enabled appears on the password screen in Settings .

    Android :

    Unfortunately, Android does not already support device-level encryption for smartphones. If you want to encrypt your email, calendar and contact information from your company's Exchange account, you can do so by using a third-party Exchange client called Touchdown. However, device encryption is available as part of Android 3.0 (Honeycomb), which is targeted to tablet devices. It should lead to smartphone operating systems sometime in the near future.

    After reviewing some of these common smartphone issues, you should have some kind of idea about how to protect yourself from damage or theft of your device and loss of personal information from your device. With smartphones becoming more and more popular, more security issues will arise and the operating system's microSD will continue to adapt to their operating systems to combat these issues best. At some point, these security packages may even be integrated into your operating system or pre-installed by your network operator.

    Source by Eddie Burkett

Leave a Reply

Your email address will not be published. Required fields are marked *