Not only can your Smartphone be
hacked, it can be done very easily without your knowledge.
At the end of the day, everything is
hackable. What I am surprised about is that people sometimes forget that it's
so easy to hack into these devices," said Adi Sharabani, the co-founder of
mobile security company Skycure, who used to work for Israeli Intelligence. Even if a malicious attacker cannot
get into your phone, they can try to get the sensitive data stored inside,
including contacts, places visited and e-mails.
"It's important to realize that
the services your Smartphone relies on are much more attractive target to
attackers. So for example, the photo leak that happened from iCloud where a
bunch of celebrities had their photos posted all over the Internet is the perfect
example," said Alex McGeorge, the head of threat intelligence at cyber
security company Immunity, Inc.
Often, the hack or data breach occurs
without the consumer's knowledge, according to Sharabani.
And it's not just consumers that
criminals target. With the rise of smart phones and tablets in the workplace,
hackers attempt to attack enterprises through vulnerabilities in mobile
devices.
Both Sharabani and McGeorge perform
attack simulations for clients and find that these hacking demonstrations usually
go undetected.
It's usually very rare that a breach
that originated through a mobile device or is just contained to a mobile device
is likely to be detected by a corporation's incident response team,"
McGeorge said.
And Sharibani agrees. He says he's
still waiting for someone to call him and say that their IT department
identified the attack demonstration.
"No one knows," he said.
"And the fact that organizations do not know how many of their mobile
devices encountered an attack in the last month is a problem."
But there is a silver lining,
according to the wireless industry.
"The U.S. has one of the lowest
malware infection rates in the world thanks to the entire wireless ecosystem
working together and individually to vigilantly protect consumers," said
John Marinho, vice president of technology & cyber security at CTIA, the
wireless association. CTIA is an industry group which represents both phone
carriers and manufacturers.
Here are the three ways a smartphone
is most likely to be breached.
Unsecure Wi-Fi
Wi-Fi in public places, such as cafes
and airports could be unsecure, letting malicious actors view everything you do
while connected.
Someone is trying to gain access to
your email, to your password. They are trying to gain access to all of your
contacts, who you meet with, where and when. Do you approve? So me, as a
security expert, I always click cancel.
To know if you're on an unsecure
connect pay attention to warning message your device is giving you. On iPhones,
a warning will come up saying that the server identity cannot be verified and
asking if you still want to connect. You will be prompted to click
"continue" before you can join the Wi-Fi. Despite the warning,
"92 percent of people click continue on this screen.
"Your phone actually has a lot of
really good built in technology to warn you when you are going to make a poor
security decision. And what we found through our general penetration testing
practice and talking to some of our customers is people are very conditioned to
just click through whatever warnings it is because they want the content,"
said McGeorge.
To protect yourself, be careful when
connecting to free Wi-Fi and avoid sharing sensitive information.
Operating system flaws
Despite the best intentions of
smartphone manufacturers, vulnerabilities are found which could let attackers
in.
"We see that the average ratio is
that more than one vulnerability being publicly disclosed every day, and 10
percent of those are critical vulnerabilities, vulnerabilities that allow
someone remotely to gain access to your device and control it," Sharabani
said.
Device manufacturers release operating
system updates frequently to protect users.
"All of those updates have really
important security fixes in them and people are worried well maybe this is
going to impact how I use my phone or maybe my phone isn't compatible. They
need to apply those updates as soon as they come out," said McGeorge.
Experts advise you install operating
system updates as soon as they are available. Once updates are released,
hackers know about vulnerabilities and attempt to breach out-of-dates devices.
No comments:
Post a Comment