SmartPhone Security (Part II)

With that increased utility, however, there comes more vulnerability. Having a lot of information – personally and otherwise – in your device makes your phone a goal, and as bad guys focus on implants, good guys have been trying to keep bad guys out.

Is the smartphone's security really the case?

The short answer is yes, absolutely, more and more. However, the extent to which matters matter depends on individual users or individual companies.

Thread on your mobile phone is not always easy to see. They are very simple (such as when someone finds your phone and reads all your emails) in very complex (such as Trojan horses, viruses or third-party programs that share your personal information).

Here are some common security risks, with tips, tricks and tools to combat them.

Do not Miss Your Phone:

This may seem like no brainer, but do not put the phone down on bar (especially if you work for Apple and have a prototype that nobody can see). If you are in public, do not put it in a pocket or open a bag as it is visible and you can catch it easily. Obvious suggestion, sure, but these situations are in most cases of theft of the phone.

First line of protection:

Set the phone to lock or time after a certain time, as you need a password to get back in. All major smartphone operating systems support this feature.

You want your password to be something hard for you to forget and easy to enter since you insert it repeatedly throughout the day, but it's hard for others to guess. Anything that contains your name, information found in a driver's license or number as simple as "1234", for example, is not a good password.

Here you will find schedules for various OS smartphones:

* Android:

Earlier, Android supports only a pattern upload (where you draw patterns to access the phone), but with version 2.2 of the operating system, supports it now your PIN and password. From the home screen, press Menu, Settings, Location and Security, and on the screen you will find many options for entering a password. To set the time limit of the screen, you must return to the Settings menu, and then click View. (Tip: If you decide to record the pattern, create a complex one that goes beyond itself or someone could reduce your pattern from repeated spots on the screen).


In the home screen, click Options, Security options, General settings. There you will see options to enable the password, insert or change the password and set the security time.

* iOS:

Earlier versions of iOS only allow for a four-digit PIN (which is not ideal). Luckily, iOS 4 introduced a chance to set longer passwords. Open the Settings application, then select General, Password lock. Just above the password is the Auto-Lock option that controls the time limit.

* Windows Phone 7:

Open Settings, and then select Lock and Wallpaper. From here you can set or change the password and also set the time on the screen.

Your other line of protection:

Remote wipe, as well as password protection, it is a minimum of minimum requirements for most departments, although the specific measures you need to take very much depend on your company's security .

Remote wipe means that if your phone is lost or stolen, you can remove all your data – including email, contacts, text, and documents – from the arrest, and then keep it in the wrong direction.

You or your department service can configure this feature for any major OS, as well as using Microsoft Exchange to wipe the device (provided you have an Exchange account). Those who are free of currency accounts or IT departments have other simpler options.

* Android, BlackBerry, and Windows Phone 7:

If you have one of these, you're lucky, because you can find many great third-party applications that allow you to remove your device remotely. Mobile Security looks just one example that allows you to wipe your device over the internet, but also allows you to track lost devices through GPS, copy your data in the air and even scan for viruses. The basic info is free, but to enable advanced features like remote wipe, you must pay for a Premium Account ($ 3 per month or $ 30 a year). You will encounter big players in the security program too; For example, NotifyMDM, Symantec and Zenprise sell the many mobile device management systems to companies.

* iOS:

iPhone remote wipe is a bit trickier. If you have iOS 4.2 or higher, you can simply download the Find Phone app from the App Store and enable it in MobileMe in the Settings application. If you lose your phone, you can sign in using MobileMe on Apple's website to monitor it, post a message, or wipe it. However, if you have an older version of iOS, you'll need to pay a MobileMe account that costs $ 99 a year. Additionally, you need to enable the feature by going to Settings, select Mail, Contacts, Calendar, and click Download new data and then activate. Then return to "Mail, Contacts, Calendar" and "Display" and select your MobileMe account.

Note that all the applications and services mentioned in this section, as well as other devices (such as Mobile Defense and Where is Droid mine?), Can help you find the phone with GPS. These applications have been attracted to attention, as their use has led to the arrest of several thieves and karjackers.

Trojan Horses, Malware and Viruses

"There as there will be hundreds of millions of smartphones out there, it will be a bigger target for attackers, "says Ahmed Datoo, Head of Marketing for Zenprise. His company creates software that allows the large-scale IT department to scan all devices in the system at once, make sure no malware has entered.

Similar Articles:

"We've seen Download malware across the board for all levels. LaTely has focused on newer devices with more approval: iOS, Android, "he says.

And if you're thinking of yourself, just installing annoying software from sketchy websites. Be sure that attacks may also take place in public stores.

What should you do? Consumers should return to third parties. If you are on Android, BlackBerry or Windows Phone 7, consider again. Lookup: It scans your phone for malware and spyware, even checking what applications you download. It said it could still miss a nasty SMS or MMS script, so think twice before opening a multimedia item from someone you do not know. Symantec, which makes products for business on almost all mobile phones, also creates devices for the consumer on Android and Windows Phone 7; more software like Mobile Defense is coming too.

iOS does not have real nasty consumer antivirus programs, but relying on Apple's strict applications in the store to handle malware. In view of the scale and speed of applications submitted and approved, things are required to flow through the cracks. Possible human error is just too great to deny. On IOS, you can use the Trend Smart Surfing application, which prevents access to sites known to contain malware or potential phishing attacks. It would be nice to see more protection for various mailboxes though.

Third Party Sharing Shares

When you install third-party applications, you provide certain privileges. This privilege may include access to your physical location, contact information (yours and others), or other personal information. Most of the time the app will be ok, but how do you know what these parties are doing with those privileges and information? Short answer: You do not.

Most network operators try to cope with this problem with a central application directory, and try to sew a bad egg before they enter. However, unwanted things come through.

Android takes a different approach, but by gaining central control but giving end users more information. Before you install an application on Android, the app will ask you for certain permissions. Do not simply ignore such messages. If you're just trying to set up a simple wallpaper, ask yourself why you need access to your contacts and location. Be positive when you grant a permit.

Additionally, with all systems, always review reviews and read the comments to see what other users have said. If the app has only 50 downloads and two star rating, do a little dig and find out why. The best protection here is actually common sense. If you do not, Lookout Premium can provide you with an overview of the permissions you have provided.

Even major companies including Facebook and Pandora have been sharing (read: selling) more user information than was generally thought. Your choices are almost limited to avoiding these applications or starting a British writing campaign.

Which OS is the safest?

There is no easy answer to this question. All major smartphone OSs have made significant strides in the past year.

"From a corporate and security point of view, BlackBerry is still a gold standard," says Khoi Nguyen, Head of Symantec Mobile Security Logistics. RIM phones also feature advanced encryption for your device – including for the SD card – which is cleaned for use by some senior governments.

But in the last six months, Apple and Android have increased security management support, and more companies seem to be using them, Nguyen adds. Also, to make additional security, device manufacturers like HTC and Motorola have added software on top of their various OSs phone support.

With Windows Phone 7, Microsoft follows a similar policy with Apple and Google because it starts by keeping the mobile phone company focused on its consumers. The company is likely to add more business-friendly security in the next few days.

One of Android's biggest security cavities that slows down business acceptance is the lack of encryption, especially on the SD card. There is a significant risk for business users, who save their e-mail attachments on unsecured SD cards.

BlackBerry phones offer the ability to encrypt SD cards, but iOS and Windows Phone 7 do not support uploading. That said, many companies are willing to accept phones with unsecured SD cards, as long as remote wiping is installed. This arrangement will also be good for most consumers. However, it is important to keep in mind that to wipe the phone remotely, it must be switched on and have a data connection. So if someone draws the battery out of Droid before wiping it, you can not delete your SD card.

Smartphone security for the information device:

The company's ecosystem has changed dramatically last year. Each end user wants to stick to the device they want personally and they want to use it for work. Refuse them that freedom does not always go so well.

"The days in the information field try to control what devices users can and can not have – this battle is lost. They should focus on their actual project, which ensures their users safety," says Datoo of Zenprise.

With so many platforms and new devices that flow on the market, how can small businesses possibly develop software to track all of them and keep them virus free? More companies are turning this job over to software professionals, such as NotifyMDM, Symantec and Zenprise, which allows managing enterprise devices in one interface.

Third-party software allows computer applications to search all devices at the same time – whether for 5 or 57,000 users – yet the latest, most advanced phones are still available.

It's brave, new and constantly developing a world out there. While we have not yet seen an attack on smartphones that compete for the scale of attacks on computers, attempts are becoming more and more frequent and they will continue to increase. It's brave, new and constantly developing a world out there. While we have not yet seen an attack on smartphones that compete for the scale of attacks on computers, attempts are becoming more and more frequent and they will continue to increase. Critical thinking and consistent communication with your disclosure requirements. could be your best defense.

Source by Monty Henry

Leave a Reply

Your email address will not be published. Required fields are marked *