In today’s blog, we start to examine the weaknesses of Smartphones. Just as much as we are addicted to them, yes, they do have their drawbacks as well:

The Major Security Vulnerabilities Posed to Smartphones

  • Data Leakage:

We all love to download mobile apps onto our Smartphone.  It’s fun, and a very quick, convenient way in which to access information and data in just two seconds or less.  But believe it or not, these very same mobile apps which you use on a daily basis can also be the biggest source of what is known as “Data Leakage”.  This occurs when the app secretly sends your private or work related information to the provider whom made that specific available.  Also, mobile malware can use specific distribution code to in which to inflict damage to iOS and Android based Smartphones, through the mobile app.

  • Unsecured Wi-Fi Access:

Gone are the days of using a hard-wired Ethernet computer in order to gain access to the Internet, or other critical files and resources which you need to perform your everyday job functions.  With the advent of wireless access, we can now access these same items literally anywhere or at any time in the world, either from our Smartphone or tablet.  But, this new founded freedom comes at a cost:  The Wi-Fi connection is very insecure.  This is best exemplified by using your device at Starbuck’s.  The username and password is publicly known, and because of that, the connection is extremely vulnerable to any covert Cyber security attacks.  The best way to know if you are on a secured Wi-Fi connection is if you see in the URL address an “https” versus the usual “http”.  The former stands for “Hyper Text Transport Protocol Secure”, which means that the connection is encrypted to a certain degree.  It is highly recommended that if you have to use an unsecure Wi-Fi, so sparingly without submitting any type of confidential information (such as your credit card or Social Security number).

Stay tuned for more weaknesses tomorrow!!