How to keep your cell phones secure
Cyber Threat

How to keep your cell phones secure

Project Name: How to keep your cell phones secure

Description: Mobile malware is spreading exponentially today, stealing personal and professional information which may ruin one’s financial, professional and mental health. This blog shares all simple tips to understand how one’s cell phone can be managed smartly from malwares and viruses.

Author: Rohit D Sadgune / Amruta Sadgune

FAQ:-

  1. How do viruses spread in mobile?
  2. How to keep your cell phones secure?
  3. How to understand that cell phone is affected with threats?
  4. How to protect your mobile from threats?

Today, imagining ourselves without a cell phone is like getting a feeling of incompleteness. Cell phones have already become an integral part of our lives. In such scenarios we need to take care of all the possible paths which may acts as a threat to the device. Smart phone today has become more technically advanced. Now a day, malware from mobile apps is causing a big issue in cell phones. Let us educated ourselves on the adversaries and how they spread.

How do viruses spread in mobile?

  1. Downloading of free apps from internet for gaming, social purpose or for any other technical purposes which may contain malware.
  2. Visiting malicious websites which contains malware or adversaries.
  3. By clicking on the fake errors, messages, pop-up windows that can directly download malware on mobile.
  4. Opening emails from non-trusted resources which highly spreads viruses on mobile.
  5. SMS containing suspicious links or asking for personal information.
  6. Apps which have questionnaires to be filled.
  7. Insecure Bluetooth wireless connection
  8. Multimedia Messaging Service
  9. Theme packages
  10. Music players
  11. PC Hookups :- Connecting to a system which is already infected with threats.

Example of Mobile Malwares

Cabir :- This malware spreads through insecure Bluetooth connection. Infection pattern reduces the battery life and deletes personal data. Potential origin of this threats is from France.

CommWarrior:- This malware spreads through Bluetooth and MMS. It deletes personal data on14th of every month. Potential origin of this threats is from Russia.

Skulls:- This is highly destructive malware. This gets installed on your device through theme packages, apps, music players. potential origin of this threats is from Turkey.

CardTrap:- This is cross platform infected malware. This malware overrides phone-book, messages and corrupts valuable personal data. potential origin of this threats is from Turkey.

Doomed:- This malware is bundle of all above listed malwares. This threat prevents mobile device to get restart and in parallel it spreads.

How to identify that cell phone is infected with threats?

  1. Increase in data usage
  2. Rapid pop-up
  3. Poor performance of your cell phone (slowness of app opening or functioning)
  4. Unexpected calls and messages.
  5. Drain of battery
  6. Change of home page on browser of cell phone.
  7. On visiting website forcing you to download app or register on portal
  8. Unnecessary themes are installed
  9. Music players behaves abnormally

How to protect your mobile from threats? 

  1. Use apps from trusted source only, check information of the app first before downloading. Try avoiding third party apps.
  2. Create strong passwords.
  3. Do not click on any non-trusted or suspicious looking links.
  4. Keep your mobile anti-virus up to date.
  5. Clean all junk files from mobile regularly.
  6. Read all emails with an eagle eye like reading the subject carefully, senders email id and also the email attachments.
  7. Do not click on URL mentioned in the emails if you find it irrelevant or suspicious.
  8. Uninstall all irrelevant apps from mobile which are not needed.
  9. Do change your password regularly like once in 6 months.
  10. Avoid taking calls from high rated spams.
  11. Ensure that your personal and financial transactions are done through secured and trusted network.
  12. Always avoid connecting to non-trusted Bluetooth, WI-Fi network and Data sharing apps.
  13. Take regular backup of your mobile data.
  14. Setup a remote Wipe: Google SYNC your device. If device is lost then wiping all data remotely can be done by using this feature.
  15. Encrypting phone storage: Modern devices today have the ability for encryption of the phone storage. In case if device is stolen there is a little chance to use the data present in it.

 

Have a happy and safe surfing !

No Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*

Cyber Threat
Indicator of Attack vs Indicator of Compromises

Indicator of Attack vs Indicator of Compromises Project Name: Indicator of Attack vs Indicator of Compromises (IOA vs IOC) Description: –  Cyber Threats are nothing but system to system attack that creates adversary’s efforts on the confidentiality, integrity, or availability of a digital information resident on system. Cyber-attacks are increasing in …

Power of Security Operation Center
Cyber Threat
Power of Security Operation Center

Power of Security Operation Center Project Name: Power of Security Operation Center Description: – Power of Security Operation Center is a concept of a highly skilled expert team working towards continuously monitoring and improving organizations security in the process of prevention, careful planning, detection and responding with a well-defined process. In …

Cyber Security Lifecycle
Cyber Threat
1
Cyber Security Lifecycle

Cyber Security Lifecycle Project Name: Cyber Security Lifecycle Description: Without applying a Lifecycle mechanism to a cyber security in any organization there arises an increased risk of cyber threats affecting the system. A systematic approach in any organization delivers and resist the cyber-attacks, persistent threats to a great extent. The cyber …

%d bloggers like this: