Security Risk Associated with Mobile Devices

1429 Words Sep 30th, 2013 6 Pages
Security Risk Associated with Mobile Devices

The term mobile devices are not limited to cellphones; they include iPads, iPods, Laptops, PDAs and e-Readers. These devices act as a lifeline to the outdoor world, and are frequently used for navigating, social networking, shopping, banking and business purposes. What is often forgotten about these devices is that they are gateways to hackers. “Mobile devices can be used by a hacker as an access point into many other aspects of your digital life as well the lives of others in your network, making mobile security about more than just protecting your phone,” (Certic, 2013). Mobile Technology became widely accepted by most of the world in the early 1980’s and since then, the evolution of
…show more content…
This type technique has been used by hackers to persuade the individual into clicking the link and view the file. Once that takes place, the hacker now has the ability to access private information.
Phishing is another way cyber thieves attempt to gain your information. “Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication,” (Igor, Dmitry, Andrey, Dmitry, Anastasia, Alexander, 2013). This security risk is often attempted by either email or instant message. User’s receives an email or text message of fake urgency that attempts to persuade the user to click a link and direct them to a spoofed website very similar to a trustworthy business. Once that page is viewed the user’s phone can become immediately infected, and other links on the page are often embedded with malware. Additionally, once the user insert their username and password, it is sent directly to the hacker providing them the information needed to gain access to personal accounts, i.e. bank accounts, email accounts, social networks accounts, household accounts, etc.
For devices such as iPhones and iPads, a major threat to those devices would be Malicious Mobile Applications. This type of hacking can be rather
Open Document