Your smartphone is now a much more tempting target for cybercriminals than your desktop computer, and unless you take proper precautions, it is easier to hack as well.
Think of it this way: Your computer might have sensitive work documents, banking information or personal records, but there are only a few ways people can access those files — in person, via a network or over the Internet.
On the other hand your smartphone is almost always on, connected to the Internet, logged into your email and social media, and likely has at least a username stored for your bank account. Your smartphone contains as much sensitive information as your wallet does — more, if you count the contact information for your family and friends.
Smartphones can access the Internet, which puts them at risk for a variety of malware and compromising exploits, but malware can come via almost any phone function. Text messages are easily exploitable, especially since an average text-messaging app takes no security precautions. They open automatically and load as soon as your phone connects to a network; in effect, they can't be blocked.
Hackers also monetize these hacks in very subtle ways. Rather than stealing credit card information to buy themselves expensive things that are extremely easy to track, they often subscribe users to premium texting services, which often cost as little as $3 per month.
Today these scams are much more common in Eastern Europe. This is because there users get charged for premium texts on-the-spot rather than monthly.
Many (but not all) users will catch the extra charge on their phone bills, cancel the service and prevent the cybercriminals from ever getting their money. But an enterprising hacker can nickel-and-dime his or her way into relative richness.
Hackers do not represent the only mobile threat. Leaving your Wi-Fi and Bluetooth functionality activated when you don't need to do so represents another considerable privacy risk. Phones broadcast signals that reveal their model number and location information and now shopping malls are beginning to use this data.
By tracking phones, malls can get a good idea of their shoppers' demographics (even though there's no way to identify users, phone preference varies by age, sex and race), which shops their patrons visit and how the two correspond. If users download retail-specific apps, stores can also track when users enter and leave their premises and communicate accordingly. At least downloading an app at allows the user to choose whether or not to participate.
Retailers are not the only entities interested in aggregating mobile data. Up until recently, recycling bins in London had the same functionality. The City of London wanted to gather data on cellphone usage without any apparent end goal in mind, and walking by a recycling bin (image below) while your cellphone's Wi-Fi is active would transmit your phone's build and location information directly to the British government.
Public outcry put an end to the invasive bins, but while the City of London was the first government entity to try such a tactic, it probably will not be the last.
In order to keep your mobile information private and safe, keep Wi-Fi and Bluetooth turned off unless you need them. This issue is not going to go away and will problem get more complex and confusing before there are any easy answers for the every day mobile user who wants to be mobile, socially active and.... secure.
No comments:
Post a Comment