Smartphone Security How safe are you?. Main Points 1. Malware/Spyware 2. Other Mischief 3. How a phone might get infected 4. Staying Safe a. Malware b.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
POSSIBLE THREATS TO DATA
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
1 Alcatel Onetouch Antivirus. 2 Thinking about security on your smartphone Alcatel OneTouch? We have the solution. Among the applications on your smartphone,
7 Effective Habits when using the Internet Philip O’Kane 1.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
 Smartphone overview › Platform comparison  App Construction  Smartphone malware and viruses  Security threats  Keeping your Smartphone clean.
Internet Fraud By: Noelle Woodman.
Scams Stevie's Scam School videos
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
. Introduction to Welcome to . This module will give you the skills you need to send and receive . Also to send and receive attachments.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Threats to I.T Internet security By Cameron Mundy.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Crimes.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
IT Security for Users By Matthew Moody.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
1.1 System Performance Security Module 1 Version 5.
Staying Safe Online Keep your Information Secure.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Emily Ansell 8K viruseshackingbackups next. Viruses A virus is harmful software that can be passed to different computers. A virus can delete and damage.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
SMARTPHONE FORENSICS 101 General Overview of Smartphone Investigations.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Top 100 security tips. Topics Social Engineering Social Media Physical computer security Password security Smartphones Encryption Anti Virus Public computers.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Managing Money Workshop The National Autistic Society AGM
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Computer Security Keeping you and your computer safe in the digital world.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Chapter 40 Internet Security.
What they are and how to protect against them
Hotspot Shield Protect Your Online Identity
Unit 4 IT Security.
Two-factor authentication
OWASP CONSUMER TOP TEN SAFE WEB HABITS
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Staying Austin College
© EIT, Author Gay Robertson, 2017
Risk of the Internet At Home
Digital $$ Quiz Test your knowledge.
How to keep the bad guys out and your data safe
Security in mobile technologies
Presentation transcript:

Smartphone Security How safe are you?

Main Points 1. Malware/Spyware 2. Other Mischief 3. How a phone might get infected 4. Staying Safe a. Malware b. Loss c. WiFi/Bluetooth

I. Malware/Spyware on My Phone - What Can Go Wrong? QUERY1: If a hacker got into your phone, what would you NOT want him/her to see &/or copy…?

Hackers can see and in some cases even alter:  calendars, address books, contact lists  photos  iTunes music files  text messages, old and new (even deleted ones)  details about every phone call  the location of the phone at all times  Web browsing details and history  Plus, all your subsequent phone calls could be recorded and forwarded to a third party

Hackers can make calls from your phone without your knowledge QUERY 2: What websites or numbers would you NOT want a hacker to call from your phone…? Malware/Spyware on My Phone - What Can Go Wrong?

 Porn sites … $$$  Overseas numbers … $$$  The hacker herself. This turns the phone into a bugging device because he/she can hear everything you say and (maybe) do  Your contacts in the middle of the night

QUERY 3: Is it safe to conduct financial transactions over my cell phone…? Malware/Spyware on My Phone - What Can Go Wrong?

 In January, 2010, a single developer created fake 99-cent Android apps for over 50 banks. The app prompted users for their banking username and passwords [Notes]  In 2011 a hacker built a botnet that could steal data such as online banking credentials off “jailbroken” iPhones [Notes]

2. Other Mischief  Have you ever heard of a DDOS (distributed denial of service) attack? What is it?  Can cell phones be directed by a “slavemaster” to slam their carrier with so much traffic it can’t handle it?  Yes, they can

3. How Does a Phone Get Infected?  Does a hacker need physical access to your phone?  NO  So how does the malicious code get there…?

Malicious software can be:  downloaded by a click on a website link  opened in an /text attachment  introduced by an infected app  introduced simply by clicking on Quick Response codes (those black-and-white squares starting to show up in ads)

Via Bluetooth?!  Simply leaving your Bluetooth enabled while in a public place allows an intruder access  Hacker simply downloads software onto a laptop (available free on the web)and adds a Bluetooth antenna  Next slide gives examples of Bluetooth hacker activities

 “Bluesnarfing” - downloading any and all information from a hacked device (for example, address book information, photos, calendars, SIM card details)  Hacker could send a “corruption code” and completely shut down the phone and make it unusable  “Bluebugging” - hacker makes the compromised phone call another device (the one the hacker is using, or long-distance calls to worldwide locations)  The hacker could make “micro-purchases” with the hacked phone which show up on the subscriber’s bills phones-and-how-to-protect-yourself/

 GOALS  1. keep malware off your cell phone  2. protect the information stored on your phone if it is lost  3. protect from intrusion/theft during Wi-Fi or Bluetooth transmission  Each of these three will be discussed next… 4. Staying Safe

4a. Keep Malware off Your Phone  Do not jailbreak your phone  Do not click on website links from unknown sources ( 1/3 of smartphone users have been negatively affected by a link they clicked)  Only download applications from trusted sources, such as reputable application markets ( Remember to look at the developer name, reviews, and star ratings)

 Do not click on multimedia attachments in texts/ s from unknown sources  Always check the permissions an app requests  Using an official banking application is safer than banking through your mobile’s online browser

 Download a trusted mobile security anti-virus app for your phone  Learn how to update your operating system ( software/). software/  Beware of Porn sites ( Nearly one-quarter of malware on phones and tablets comes from visits to porn sites)

How are we doing (malware) ? Student responses n=106 total n=85 with smartphone I have or definitely would I haven’t but I might I haven’t and would not Don’t know Do you open multimedia attachments received in texts or s from unknown sources? 45%16%33%6% Do you download apps that request access to your contacts or other personal information? 38% 10% 45% 7% Have you installed anti- virus software on your smartphone? Yes 24% N/A No 63% Don’t know 13%

Why might people click on website links or open multimedia attachments from unknown sources?

4b. To minimize damage if phone is lost or stolen  Password/passcode protect your phone  Log off mobile apps (Logging in every time prevents someone from having access if you lose your phone)  Backup and secure your data at least monthly (Contacts, documents, and photos, e.g.)  Install security apps that enable remote location and wiping  Wipe data on your old phone before you donate, resell or recycle it  Report a stolen smartphone

How are we doing (if lost)? YesNo Don't Know To wake up after idle, is a password or passcode required on your smartphone? 54% N/A 45% 1% Always Some- timesNever Don’t know Do you disconnect off applications such as Facebook and Gmail when you are done using them? 19%30%45%6%

Why might people not password protect their phone?

4c. Wi-Fi/Bluetooth transmission  When transmitting information via wireless networks, use encryption  Disable Bluetooth when you are not using it

How’re we doing (WiFi/Bluetooth) ? Always or Most of the Time Some- times Never Don’t use this feature Do you disable Blue Tooth when it's not in use? 55% 7% 13% 25%

Why might someone keep Bluetooth enabled when not using it?

Last question – have you or anyone you know had any type of smartphone security breach? Very Serious A bit of a problem Some- what annoying Harm- less No one I know has I or someone I know personally has experienced a security threat with their smart phone that was… 3% 9% 22% 4% 62%

 Describe…