Mobile device security threats are on the rise owing to the increased use of such devices to transact data. According to Wang et al., Kaspersky detected over 3.5 million malware on more than 1 million user devices in 2014 (Wang et al., 2019). In 2017, malware detection on such devices reached 360,000 malicious files per day. Out of all the malicious files detected, 78% were malware files, contributing to about 280,000 malware files per day (Wang et al., 2019). Most of these files targeted mobile devices. Mobile threat compromises mobile security and affects a considerable number of users globally.
One of the reasons mobile security and mobile threats are essential is their vulnerability to data leakage. Mobile devices are the leading cause of unintentional data leakage (Wang et al., 2019). Allowing permission for the mobile application to access the device has always been a problem. Specifically, “riskware” applications pose real problems when given access to the device. These are free apps found in the official app stores and masquerade as an advertisement but, in essence, send personal and corporate data to a remote server where attackers can use such data for cybercrimes (Wang et al., 2019). Besides, data leakage also happens through enterprise-signed mobile applications (Wang et al., 2019). Malware mobile programs that use and distribute native code in all mobile operating systems compromise mobile security. The need to minimize such malware is to deny authorization of permission to malicious apps and those that are official.
Mobile is also the new target because of the unsecured WI-FI that these devices access. Technology edge has increased data demand, and no one would want to burn through cellular data when wireless hotspots are available. Free WI-FI networks are usually unsecured and pose a massive threat to the mobile devices that will access them (Wang et al., 2019). Hackers target mobile devices using unsecured WI-FI to create mobile security threats (Canbek, 2018). Once the hacker access the device, data and information regarding the application that has been installed in the mobile device, such as PayPal, credit cards, and VoIP conversations, can be compromised (Canbek, 2018). The best way to avoid such mobile threats is to prevent a free WI-FI network.
Besides, mobile is the new target because of the rampant phishing attacks imposed on the devices. Mobile devices are always powered on and can monitor various applications, including real-time email notifications. Through this strategy, mobile devices have suffered phishing attacks. Specifically, the mobile vulnerability comes when the user opens and reads emails received (Canbek, 2018). In this way, mails usually conceal essential information and may reveal important information about the sender; the user will only check the content of the email and the sender unless they expand the header information for such malicious data. In addition, attackers pose mobile security threats by using hidden links in the email that a user can click. Therefore, it is necessary to an email on the computer rather than a mobile device.
Therefore, mobile is the new target because of the associated vulnerabilities. Mobile devices have been targets for cyber threats, ranging from data leakage to unsecured WI-FI to phishing. The devices contain personal information accessible on the go, and attackers are aware of this, so they manipulate users to provide permission to access the most crucial information and data that hackers can use to commit the attack. Adopting an effective strategy when using mobile devices is critical in preventing such malicious activities.
References
Canbek, G. (2018). Cyber security by a new analogy:“the allegory of the ‘mobile’cave”. Journal of Applied Security Research, 13(1), 63-88.
Wang, S., Chen, Z., Yan, Q., Yang, B., Peng, L., & Jia, Z. (2019). A mobile malware detection method using behavior features in network traffic. Journal of Network and Computer Applications, 133, 15-25.
Recent Comments