Book Image

Mobile Security: How to Secure, Privatize, and Recover Your Devices

Book Image

Mobile Security: How to Secure, Privatize, and Recover Your Devices

Overview of this book

The threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can leave your personal information dangerously exposed. Your online safety is at risk and the threat of information being stolen from your device is at an all- time high. Your identity is yours, yet it can be compromised if you don't manage your phone or mobile device correctly. Gain the power to manage all your mobile devices safely. With the help of this guide you can ensure that your data and that of your family is safe. The threat to your mobile security is growing on a daily basis and this guide may just be the help you need. Mobile Security: How to Secure, Privatize, and Recover Your Devices will teach you how to recognize, protect against, and recover from hacking attempts and outline the clear and present threats to your online identity posed by the use of a mobile device. In this guide you will discover just how vulnerable unsecured devices can be, and explore effective methods of mobile device management and identity protection to ensure your data's security. There will be special sections detailing extra precautions to ensure the safety of family members and how to secure your device for use at work.
Table of Contents (21 chapters)
Mobile Security: How to Secure, Privatize, and Recover Your Devices
Credits
Foreword
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Tips to Help You Protect Your Mobile Device
The History of Social Networking, the Internet, and Smartphones
Index

Appendix C. Tips to Help You Protect Your Mobile Device

The United States Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C) established a unit called the Internet Crime Complaint Center (IC3) to provide a single point of contact for people reporting Internet-related criminal complaints. After researching the complaints, the IC3 refers them to the appropriate law enforcement or regulatory agency. The IC3 also publishes warnings on new threats to people via technology. The unit developed a list of tips to help you protect your mobile device, available at http://www.fbi.gov/scams-safety/e-scams, and copied here in its entirety (as of July 9, 2013).

  • When purchasing a smartphone, know the features of the device, including the default settings. Turn-off features of the device not needed, to minimize the attack surface of the device.

  • Depending on the type of phone, the operating system may have encryption available. This can be used to protect the user's personal data in the case of loss or theft.

  • With the growth of the application market for mobile devices, users should look at the reviews of the developer/company who published the application.

  • Review and understand the permissions you are giving when you download applications.

  • Passcode-protect your mobile device. This is the first layer of physical security to protect the contents of the device. In conjunction with the passcode, enable the screen lock feature after a few minutes of inactivity.

  • Obtain malware protection for your mobile device. Look for applications that specialize in antivirus or file integrity that helps protect your device from rogue applications and malware.

  • Be aware of applications that enable geo-location. The application will track the user's location anywhere. This application can be used for marketing but can also be used by malicious actors, raising concerns of assisting a possible stalker and/or burglaries.

  • Jailbreaking or rooting is used to remove certain restrictions imposed by the device manufacturer or cell phone carrier. This allows the user nearly unregulated control over what programs can be installed and how the device can be used. However, this procedure often involves exploiting significant security vulnerabilities and increases the attack surface of the device. Anytime an application or service runs in "unrestricted" or "system" level within an operation system, it allows any compromise to take full control of the device.

  • Do not allow your device to connect to unknown wireless networks. These networks could be rogue access points that capture information passed between your device and a legitimate server.

  • If you decide to sell your device or trade it in, make sure you wipe the device (reset it to factory default) to avoid leaving personal data on the device.

  • Smartphones require updates to run applications and firmware. If users neglect this, it increases the risk of having their device hacked or compromised.

  • Avoid clicking on or otherwise downloading software or links from unknown sources.

  • Use the same precautions on your mobile phone as you would on your computer when using the Internet.