Sunday, October 17, 2010

Keep up with your smartphone.

Mobile phones are getting smarter by the day and you need to stay up to speed as well. As you download more and more applications to maximise the use of your smartphone , how do you know that the file you're installing is safe? And if your phone mysteriously hangs and reboots while you're at the coffee shop ,don't dismiss it lightly .You could have just downloaded a code through an unauthorised bluetooth connection that could compromise your call details, messages,pictures,videos,and give out updates on your location.


YOU'RE UNDER ATTACK IF :
* You get a link in an SMS from an unknown sender.If you click on it ,it could download and install a trojan .This attack is called smishing .
* You get an SMS from your bank ,asking you to validate your credit card details.Remember,SMS sender can be spoofed and there's no way to know who the actual sender is .
* You download the latest utility from an app store that happens to have crimeware bundled with it. This cold silently transmit financial information or other data stored on your phone.
* Your bluetooth enabled phone gets a crafted message that your phone is not equipped to decipher and starts behaving abnormally. This attack is called bluejacking.
* You get a pairing request from an unknown person and accept, only to have adware ,malware or spyware installed on your phone .


PROTECT YOURSELF :
* Make sure your bluetooth is always turned off. Turn on only when required and do not accept pairing requests from unknown people.
* Do not click on links sent to you by SMS or even email unless known .Don't save business cards or view MMS from an unknown sender .
* Install a Smartphone antivirus like FSecure,Kaspersky or Norton and update it regularly.Avoid installing a free antivirus from an unknown vendor,as it may be a trojan .Update the operating system regularly.
* Only install application that have valid vendor certificates.
* Validate phone calls requesting you to SMS confidential details.Never divulge confidential information requested via email or SMS.
* Configure the auto phone lock with a strong password.

No comments:

Post a Comment

IF YOU WANT TO COMMENT ON MY BLOG PLEASE DO SO. I DON'T REQUIRE COMMENTERS TO REGISTER OR DO ANY OTHER TIME CONSUMING WORK. EVERY WORD OF YOURS IS VALUED . THANK YOU.

ANY CONTAIN AND PICTURE IN THIS BLOG ARE USED FOR EDUCATIONAL , ANALYTICAL PURPOSE . IF ANY COPYRIGHT IS VIOLATED , KINDLY INFORM AND I WILL IMMIDIATELY REMOVE THEM .