In: Economics
What types of threats do smartphones face?
Are there any particular vulnerabilities to mobile devices
What qualities of apps make them a vulnerable security point in smartphone use
Are apps more or less likely to be subject to threats than traditional P C software programs?
A. There are various types of threats that smartphones face. Let's discuss it one by one:
1. Spyware : Spyware picks data about you based on the use of your
internet service and transmits it to a third party, who sell it to
various companies. These companies, in turn, use your data for
sending you advertisements. Spyware also collects information about
your location, internet usage and even reach your contacts.
2. Viruses and Trojans : There is also threat of viruses and
Trojans to your mobile phones. They typically attached with
legitimate programs. Viruses and Trojans can hijack mobile phones
and mine the important information like banking information, stock
market or any personal information.
3. Drive-by downloads: It is a malware installed on your device
without your knowledge. It can come to your mobile phone when you
visit wrong website or open a wrong email.
4. Phishing apps : Phishing apps look like real apps, that secretly
collect the information you enter such as passwords, account
numbers, secret codes and many more.
B. Are there any particular vulnerabilities to mobile devices ?
Yes, the particular vulnerabilities to mobile devices are:
Weak Password Setting for the device: A mobile when stolen by a
thief can not be opened by him if it is strongly password
protected. So you should protect your device with a very strong
password. All applications stored inside your mobile should be
password protected so that it can't be accessible to a wrong
man.
Unnecessary storage of important information: Nowadays everybody
wants to keep their important information within their finger tips.
But it is risky to store all your important information in your
mobile phones that may be hacked. Don't store any passwords of your
important information in your mobile phones.
Access to unauthorized person : Don't let other people to access
your mobile phone, they may try to collect important information
about you. So always keep your phone in a safety place and carry it
carefully.
Besides this use of unauthorized content, interaction with other
systems, use of unknown applications, use of public/unsecured
networks or devices can create problems for your mobile phones.
C. What qualities of apps make them a vulnerable security point in
smartphone use?
Apps need to be more secured and user should be alert while
downloading any app to their mobile phones.
Code need to be very strong: The developers should be very careful
while designing apps, they should use strong codes to protect their
apps from various threats. Before releasing any app to the market,
the owner should check its security and application thoroughly.
There should be a trusted site for downloading apps : Many people
do a mistake while downloading apps, they don't check whether the
site is a trusted one or not. As a result of which their devices
are affected by the viruses.
D. Are apps more or less likely to be subject to threats than
traditional P C software programs?
Yes, apps are more likely to be subject to threat compared to
traditional PC software programs. Because there are huge number of
apps applied in mobile phones which can be used anytime and
anywhere. People are so busy in using these apps that they don't
even read any information and policies of these apps before
installing. There are some apps in which its use is not clearly
mentioned and people are easily captured by the hackers.