Download presentation
Presentation is loading. Please wait.
1
Security in mobile technologies
By Leon Antony
2
Verizon asks the FCC The 60 Day policy- as part of an initiative to prevent identity theft and fraud. Verizon asks the Federal Communications Commissions to lock new smartphones for their network for 60 days.
3
Data Leakage The unauthorized transmission of data from within an organization to an external destination or recipient. Mobile apps are often the cause of unintentional data leakage. Known as Riskware Apps
4
Unsecured Wi-Fi(Basicly Free WIFI)
1. Capture your account’s user ID and passwords. 2. Log the data of online traffic accessed on your phone or computer. In this way, they can maintain a data of the websites you mostly visit, and plan attack from these websites. 3. Gain access to your computer, its network and data. 4. Launch a spam or malware attack on your device. 5. Hijack the account you are logged into, and use it for unscrupulous purpose. 6. Redirect you to a phishing webpage where you might give away your personal information.
5
Network Spoofing Setting up fake access points or hotspots in high traffic areas. Attackers require users to create an “account” to access these free services, complete with a password. Many users employ the same and password combination for multiple services, allowing the hackers to compromise their , e-commerce, and other secure information.
6
Phishing Attacks The fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy entity in an electronic communication
7
Spyware As the name implies, this is software that "spies" on your computer. ... Spyware can capture information like Web browsing habits, messages, usernames and passwords, and credit card information. If left unchecked, the software can transmit this data to another person's computer over the Internet.
8
Security Management Device Protection: Allowing remote data "wiping" if your device is ever lost or stolen Data Protection: Preventing corporate data from being transferred to personal apps running on the same device or personal network App-Management Security: Protecting your in-app information from becoming compromised. Download a Antivirus
9
Sources
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.