 How Safe Are Smart Phones? By Sean Breslin. Can We Trust Our Phones?  Our cell phone, for most of us, is always by our side  If it is always with.

Slides:



Advertisements
Similar presentations
UNIT-e futures and UNIT-e Mobile Ben Potter Systems Architect.
Advertisements

Spyware & It’s Remedies CS 526 Research Project Spring 2008 Presented By - Ankur Chattopadhyay Erica Kirkbride University Of Colorado At Colorado Springs.
Smartphone Security How safe are you?. Main Points 1. Malware/Spyware 2. Other Mischief 3. How a phone might get infected 4. Staying Safe a. Malware b.
 Smartphone overview › Platform comparison  App Construction  Smartphone malware and viruses  Security threats  Keeping your Smartphone clean.
Free Software Alternatives: Avast! Anti-virus
Parental Control Awareness Bolingbrook Geek Squad.
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
Shala Sylvester, Dejah Sanford, Stephanie Hicks, Tierra Beason.
Using QR Codes and Mobile Phones for Learning Thomas McNeal Mark van ’t Hooft 2010 eTech Ohio Conference Columbus, Ohio.
Teaching School Wide Positive Behavior Expectations Using QR Codes Name: Barbara Grace Age of Students: Content Area of Teaching Lesson: Behavior.
Mohammed Saiyeedur Rahman.  E-commerce is buying and selling goods over the internet. This could include selling/buying mobile phones, clothes or DVD’s.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Introduction Our Topic: Mobile Security Why is mobile security important?
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Computer Safety Workshop Presented by Roy Coleman April 14, 2015 © 2015 Roy Coleman.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Digital Access Digital access is the equal ability for people all over the globe to access digital internet. The digital divide is a gap that continues.
Protecting Your Personal Information November 15, 2013.
Specialist communication channel. Sarah-Jane king.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Smartphones How Addicted Are You?. How Popular Are These Smart Phone's? According to the Nielsen Company 30 percent of all mobile phones in the United.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRO TO THE MOBILE INTERNET.
Once posted, other YouTube users can post comments about the video, post their YouTube video responses, or rate the video. Videos that are uploaded to.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
Makes Accessing Virtual Apps and Desktops from Any Device as easy as turning on your TV Citrix Receiver.
DO NOW (while you're waiting!) ‏ If you don't have a QR code reader on your phone, go to your apps store and search for a free one (try just “qr”). Download.
Are you a COMPUTER GEEK or a COMPUTER FREAK? By Evie Watkins.
Software Essentials ICT 1 & 2. What is software?  software is the set of instructions stored inside a computer  These instructions tell the computer.
Communicate in Today’s World Speak Your Prospects Language.
Society & Computers PowerPoint
Facebook Messenger Presentation
HART RESEARCH ASSOTESCIA Key findings from telephone survey of parents of children who access the Internet, conducted for Who Needs Parental Controls?
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
©Select Office Solutions 2000 PC support at your door Computer Training Business Analysis Strategic & Business Planning.
Social Media Whats Out? What’s In? What’s New?. Social Media- What’s Out: Ask.fm Tumblr Facebook.
© 2015 albert-learning.com Role of Mobile Phone Apps Role of mobile Phone Apps.
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
Mobile Device Security Threats Christina Blakley Host Computer Security.
Cyber Safety with Cell Phones By: Tanner Putnam. Cell phones  Cell phones are used to talk and now are used as mini computers.  You can download APPS.
E-Safety Parent Talk Helping to keep your children safe online.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Android and IOS Permissions Why are they here and what do they want from me?
Christian Citizenship in a Digital World Lesson 1: Online Privacy.
The batteries of smartphones can’t last forever but sure it can last for a long time if used with proper care. Getting your phone charged properly is.
How to Sync Android Phone to Computer (PC/Mac)? Are you a person that always has your Android phone in your hands? Nowadays, a cell phone is not just for.
LOGO iPhone to Galaxy Note Transfer Transfer iPhone Data to Galaxy Note 3/Note 4/Note 5/Note Edge.
Full Review of Jihosoft Android Data Recovery
How to root Android Phone and Tablet for free and safe.
Selling Ideas for QR Codes and Promotional Products.
Mobile Threats: Ransomware, RAT’s, & the Compromised App Market
Whats Out? What’s In? What’s New?
Tips to help keep children safe on the internet and social networks
The Internet and connections
Information Security.
Tips to help keep children safe on the internet and social networks
MIT App Inventor By Hans Yip.
Call AVG Antivirus Support | Fix Your PC
AirDrop Not working issue on MacBook Pro, iMac & iOS 11
Information Technology Services Education and Awareness Team
Risk of the Internet At Home
Home Internet Vulnerabilities
MOBILE COMMERCE.
Chapter 3 – part2.
Information Technology Services Education and Awareness Team
Skype.
E-Safety.
Presentation transcript:

 How Safe Are Smart Phones? By Sean Breslin

Can We Trust Our Phones?  Our cell phone, for most of us, is always by our side  If it is always with us, does that mean it deserves our trust?  We shouldn’t trust such a device no matter how often we may need it. We now need to take preemptive strikes in order to defend ourselves from our phones.

Smart Phone (Mobile) Operating Systems  Apple  iOS 6 and 7  Android  Jellybean  Microsoft  Windows MOS

Process To Publish an App ItunesVSGoogle Play 24 hours to get proper Certifications 1 hour to complete certifications Numerous checks for security and compatibility Checked during hour long process Hard to make, Extremely hard to publish Hard to make, VERY EASY TO PUBLISH

Apple  Apple only lets you download applications and content that has been preapproved  Content from online can’t be downloaded  Apps found online can’t be downloaded

Android  Android allows any video, link, app, or program to be downloaded  Unidentified developers applications will download without a hassle  This allows for anyone to make a potentially harmful application

Mobile App Hacking  This is a fairly uncommon style of hacking but it is highly effective and when done right can access an unbelievable amount of information  This process is done by a developer making a bogus app that the user thinks is a game or utility, when really it is a gateway for a hacker

App Hacking continued  Once a user has downloaded an app, the developer now has full access to you phone  This doesn’t just mean they have access to your phone, this means they can also remotely control it  This is easy to do on android because you can download almost anything to an android device, where an apple has to many checks for faulty applications to be downloadable

Most Common Style Of Cell Hacking  The most common form of cellular phone hacking is data transfer interception  This is where a hacker intercepts all outgoing and incoming calls, texts, and even data from browsing  This Process is most commonly completed with a femtocell

Femtocell  A femtocell is a wireless network extender  Can be bought at best buy or online for $100-$300  The wireless network extender is compromised and turned into a controllable cell phone tower  Once compromised, it allows the hacker to view any information going in and out of the tower

Video 

How to fight back  To best fight off an attack, a user should download mobile security software  The mobile software can be incorporated into your settings but more often is an application on your phone

Most Common Security Applications  1. McAfee Mobile Security 2.0  2. Bitdefender  3. F-Secure Mobile Security 7.6  These apps will scan pages and browsers to detect any potentially harmful links or pages

Conclusion  Be careful of what you put in your phone  Almost always assume that you aren't the only one viewing these messages or calls  If it seems shady, It probably is for a good reason

What did we learn?  It is better to spend a small amount on mobile security software now, than to spend thousands trying to get vital information back