Huntsville, Alabama (PRWEB) June 02, 2015
There is a very real possibility of having your personal information hacked from your smartphone this summer. ChargeDefense, a pioneer manufacturer in mobile charging devices, has published a special report on the current state of smartphone data security.
In the past couple of years identity thieves and hackers have become even more sophisticated, shifting their attention to mobile devices. Alcatel-Lucent’s Kindsight Security Labs report states that mobile malware infections grew 20% in 2013 and another 25% in 2014 with estimates of 18 million infected smartphones and growing quickly. In 2014, Microsoft further showed that 5 out of 10 malware instances were worms spread by USB removable drives and revealed that malware infections via USB storage devices were responsible for 26% of the total infection rate.
The article goes on to discuss protocols of many IT departments prohibiting USB flash drives yet allowing smartphone, a USB device, to still connect. The article further connects corporate enterprise hacking successes to USB-connected smartphones.
However, education, training and policies might not prevent an employee with a 5% charge left on their phone from plugging it into a USB port on his work. This small and harmless act can bring down an entire network if lurking malware on the phone can circumvent policies intended to thwart it. In fact, that is how the majority of USB Enterprise security breaches happen…Simply implementing policies to disallow USB connections is not 100% effective. A combination of education and training, port blockers, and power-only charging solutions [like the Juice-Jack Defender] is an inexpensive, practical way to keep honest employees from infecting your enterprise and exposing corporate and personal information to the bad guys.
The entire report and the infographic on “Types of Mobile Malware” can be found at ChargeDefense.com and available for syndication with attribution. In addition, ChargeDefense has posted an animated video to demonstrate how this hacking can occur with the real world example of 2010’s Stuxnet virus.