Earlier this year, the number of smartphone users in the US passed the “magic” threshold of 100 million – and it’s likely to grow. Are you one of them?
Our smartphones have become our lifelines. There’s not much we don’t do from these pocket-sized devices: Mailing, banking, Social Media, obtaining product reviews or driving directions, taking pictures, managing our contacts, calendars and libraries, shopping. And yes, every so often, we actually also use these savvy phones to place calls or send texts.
The use of smart phones for everyday online activities is on a steady rise, becoming a serious competitor for desktop and laptop use. But while most computer users have a pretty good idea about the dangers of cyber-crime and the importance of adequate protective software, the number of consumers who think of the same protection for their smartphone is significantly lower.
The dangers, however, are significantly higher.
A reasonably skilled hacker will be able to sneak his way into your cell phone’s data base simply by dialing your number. Instructions on how to do this are (apparently) conveniently provided on the Internet.
Once he dials your number in just that right way, said hacker will have access to the personal data that’s stored on your phone. Including your passwords. Photos. E-mails. Messages. Purchase information. Location.
It also includes overhearing one or all of your conversations, even the ones that happen when you’re not on the phone. And, did we mention photos, snapped remotely, and video footage, taken without your knowledge?
Technology experts expect compromised cell phones (and tablets) to be the security curse of 2012.
So — what can you do to protect your mobile device? There are several ways in which a cell phone might be vulnerable to attacks. We’ve gathered some tips on what to look out for, and ways to protect yourself:
Hackers
In this so-called “man-in-the-middle” attack, a hacker reaches into your phone’s operating system and reroutes the data to go past him before it reaches the destination you intended for it. This allows the crook to listen to calls, read texts, follow your online activities and record audio and video.
Protect Yourself:
Removing the battery is about the only way to protect yourself after you suspect your phone has been compromised. It’s hard to prevent attacks, but if your phone supports SIM cards, consider buying them in bulk and changing them regularly. A frequent change of your phone’s SIM card will make you harder to target.
Apps
This could include fraudulent apps that carry malware, or even legit but poorly designed and coded apps that hackers use as ‘carriers’ for their malicious software.
Beware of the permissions on apps. If your workout tracker requests permission to record audio —- something might be fishy. Take a closer look if an app requests to make phone calls, record audio, connect to the internet or track identity and location.
Protect Yourself:
– Only buy apps from well-known vendors that either list the app’s permission requests, or have a stringent approval system.
– Read the permissions.
– Avoid free unofficial versions of popular apps – they often hide malware in their code.
Links
Smart phones are computers. Just smaller. So don’t do anything on your smart phone or tablet that you wouldn’t do on your desktop or laptop. Don’t click suspicious links or open dubious attachments.
Protect Yourself:
Just like it’s highly recommended to protect a computer with antivirus software, you should also protect your smartphone with a security app or program.
Depending on your phone, consider providers such as Lookout, Norton or AVG. Some of these mobile security apps may be available free, others need to be purchased. Either way, don’t forget to download security updates regularly and promptly.
Mobile security software generally includes features such as detecting and preventing mobile threats before they enter your phone (such as links or apps), blocking calls, protecting your personal data and privacy and remote lock, locate and wipe functions.
For more information, please see these eye-opening articles:
Build Up Your Phone’s Defenses Against Hackers (New York Times)
Are You In Danger of Drive-By Hacking (CNN Tech)
Hackers Go After The Smart Phone (New York Times)