Security Assessment and Cell phone security
The precedent year was marked by the creation of “organized” malware: by this I mean that they were sponsored and sometimes created by states with the intention of spying on other states or large businesses. This kind of spying isn’t necessarily new, but this year it came out of the shadows and broke out for all to see.
The Stuxnet worm
An obvious example was the Stuxnet worm, which was very likely developed by the United States and Israel to strike out at Iran. This malware was capable of spying on and then reprogramming certain systems, both completely silently. Its very complex programming required hours and hours of work, which indicates the work a state organization. Finally, they had to steal cell phone security certificates in order to be able to make it.
Other virtual weapons were created, like :
- Flame (the same style as Stuxnet, maybe came from the same source),
- Gauss (a Trojan horse designed to steal information from online banking sites)
- Shamoon (as for this one, this harmful virus targeted the computers of the oil company SAUDI ARABIAN OIL CO).
Directed and targeted spying
Modern spying is thus more specialized; it no longer singles out random cell phones but rather targets governmental organizations or large businesses, like banks.
This sort of technique definitely has the wind in its sails and should develop further. Viruses will become more and more complicated and less and less detectable, up until a second internet is born, resetting all counters to zero.
A new El Dorado for viruses: mobile phones
This is indeed not a negligible trend: with mobile phones, tablets, and smartphones getting used more and more, they should be bringing their share of malware with them. A “ransom demand” arrives on the virus market: a virus that blocks your smartphone and asks you to pay to unblock it.
We can clearly see that all these viruses and other malware have a very specific goal: to get money for their creators. Hence the need for a cell phone security.
The success of smartphone applications today is not to demonstrate. However, this leads to a dispersion of our personal data. Below, an infographic that shows the increasing number of mobile applications :
Code to share :
<p style=”text-align: center;”><a href=”http://gpsonphone.com/mobile-applications/cell-phone-security-trends-concerning-viruses”><img class=” wp-image-377 aligncenter” alt=”Free infographic – Number of mobile applications” src=”http://gpsonphone.com/wp-content/uploads/2013/05/infographics-mobileapplications.png” width=”539″ height=”918″ /></a></p>
<p style=”text-align: center;”>© <a href=”http://gpsonphone.com/”>gpsonphone.com</a></p>
We know two useful apps for protecting your smartphone:
- Smartfuzz, particularly because it lets you keep your texts, calendars, address books, photos, and videos on a server, in case you get hacked. Smartfuzz also lets you erase all your phone information by sending a basic text, in case a hacker gains possession of your phone. Unfortunately Smartfuzz is no longer distributed today.
- Spybubble, which also lets you back up your texts and other phone info like your photos, but which additionally lets you record your phone conversations on a server.
New mobile threats : My resolution to protect my smartphone
I use my smartphone every day, and if there’s one thing I pay attention to, it’s this little mobile device that constantly follows me everywhere. It lets me play games, call my girlfriend, chat on social networks, and watch videos. Its KGB quality camera lets me take photos and videos. “But of course, as is often the case, you didn’t install any security software to protect against possible intruders, did you?”
For me, SpyBubble acts as my protection. Sure, it’s not an anti-virus program, but it backs up my info on a secure online server. Spybubble also lets me constantly receive my device’s GPS signal, wherever it is.
What are the new security threats of 2013 that threaten our smartphones from day to day?
The dangers of text messages
Text messages that look like spam may be sent to smartphone users. When you open them, they ask you to write down your bank (or otherwise confidential) information and send it back. You should definitely not do this! The best cell phone security to react is to delete these phishing texts immediately.
Wi-fi and Bluetooth risks
Wi-fi hot spots can be pirated, allowing malware to infiltrate in order to capture your password. If you don’t trust open-access internet, stay away from them!
Watch your geolocation
Watch out for who you trust with your own geolocation. It would be a shame if some ill-intentioned person took advantage of knowing where you were and committed misdemeanors against you.
Be wary of the shortened links you can find on websites like Twitter. Sometimes they conceal suspicious links that redirect you to dangerous websites or programs.
SpyBubble seems more and more to me like an essential :
- - backup program
- - cell phone security
Otherwise, without cell phone security, be aware of these risks and dangers that could be watching for you. In most cases, being conscious of the problems will be enough to avoid them.
Video : Mobile apps for a new security threat
- McAfee : 10 quick tips to mobile security, Jan. 2012
- University of Calgary : Cell phone and pda security, Nov. 2008
- 2013 IEEE security and privacy workshops : Preventing cell phone intrusion and theft using biometrics, by Ohana D. J., Phillips L. and Chen L.