Archives - Mobile Security


Only install apps from trusted sources

Before downloading an app, conduct research to ensure the app is legitimate. Checking the legitimacy of an app may include such thing as: checking reviews, confirming the legitimacy of the app store, and comparing the app sponsor’s official website with the app store link to confirm consistency. Many apps from untrusted sources contain malware that […]

Do not modify your smartphone’s security settings

Do not alter security settings for convenience. Tampering with your phone’s factory settings, jailbreaking, or rooting your phone undermines the built-in security features offered by your wireless service and smartphone, while making it more susceptible to an attack.

Don’t trust all shopping apps

As a rule of thumb, you should never download apps that you’ve never heard of before. This is especially important when it comes to shopping apps, as they’ll eventually prompt you to provide your payment information. You can trust brands like Amazon and eBay, since they are well-known services that handle millions of transactions each […]

Be cautious when chatting with iMessage

Since Apple’s iMessage application uses the internet to send your texts, it’s vulnerable to “man-in-the-middle” attacks. This doesn’t mean you shouldn’t use the app, but when you need to have a private conversation with someone or send them sensitive information like your social security number, turn to a more secure messaging tool.

Avoid charging your phone at public stations

Public charging stations are becoming more common in airports, train stations and malls. While they may be convenient, they’re also a potential security risk. Hackers can compromise these outlets, so that when you plug into them, they gain access to all of your phone’s data.

Accept updates and patches to your smartphone’s software

You should keep your phone’s operating system software up to date by enabling automatic updates or accepting updates when prompted from your service provider, operating system provider, device manufacturer, or application provider. By keeping your operating system current, you reduce the risk of exposure to cyber threats.