eMazzanti Publishes Mobile-Devices Security Threats Article

A new article reviews the potential security threats associated with common mobile devices like smart phones, Pads, Pods and laptops

  • Share on TwitterShare on FacebookShare on Google+Share on LinkedInEmail a friend
Mobile device users may not recognize the potential security threat. They suffer from a type of mobile myopia which leaves their device the perfect malware gateway.

Hoboken, NJ and New York City, NY (PRWEB) May 14, 2013

A new article entitled: The Secret Security Threat: Mobile Devices is now available from eMazzanti Technologies, an IT and computer expert in the Hoboken, NJ and New York City areas.

The free article is available here.

According to MobiThinking.com, there will be over 6.9 billion cell phone subscribers in the world by the end of 2013. And according to CNET over 84 million iPads have been sold by Apple representing 68% of the tablet market. Another 350 million iPods have been sold as well.

“The number of mobile devices is on the rise as are numerous security threats,” noted Jennifer Mazzanti, eMazzanti Technologies, president. “Unless much care is taken, security breaches in mobile devices can be the port of entry for cybercriminals.”

Mobile Myopia
Consumers and businesses alike are adopting a very casual attitude toward downloading mobile apps – powerful computer programs that could potentially contain malicious code – from unknown authors, something few people would do on their PC.

However, 96 percent of smartphones and tablets do not have third-party security software installed, according to Canalys and Juniper Research. Further, in the case of music devices, the security threat can actually get worse. There may not be any security software commonly available for them.

“Mobile device users may not recognize the potential security threat,” said Mazzanti. “They suffer from a type of mobile myopia which leaves their device the perfect malware gateway.”

Specific Mobile Device Vulnerabilities
The eMazzanti article outlines a number of specific mobile device security threats. Following are some examples:

  •     Passwords
Be sure to set a password for phone voicemail. Do not use the default voicemail and password. Make hacking voicemail more difficult by customizing the voicemail greeting and creating a new password. The default passcode for the iPhone is just four digits, which is easily hacked in about 20 minutes. Set a phone to require a longer passcode with alphanumeric characters. A user can also set his iPhone or other brand of phone to automatically erase all contents after ten failed passcode attempts. Turning off the “Simple Passcode” feature will allow for a longer password. Directions on how to do this are at the following address: support.apple.com/kb/HT4113. Android phones will allow a user to create a swipe password feature which is more secure. Never store sensitive personal details, such as a ATM PIN number or account passwords, on a mobile phone.

Passwords should be set for all other mobile devices if only to protect the data from theft should the device be lost or stolen.

  •     Cell Phone Wallet
Cell phones are now becoming our wallets. Just by swiping a cell, a person can purchase goods and services. This sounds great but be aware that Google wallet has already been hacked. There are easy step-by-step instructions on the internet on how to hack a wireless phone. Of course it’s a federal offense but it is very easy for criminals to infect a phone just by sending an email attachment or SMS message. The telephone function itself can also be hacked which can re-route phone calls. So, when a user thinks he is calling his bank, he may actually be talking to someone in Eastern Europe. Organized crime groups are aware of all the major banks phone numbers.

Most people do not realize how much privacy they are giving up just by using a wireless phone. A phone is tracking person 24/7 so a travel pattern can be developed over time.

  •     Apps
Every app has its own specific privacy and permission requirements and settings. A person should verify that he is not providing any information to an app that is not needed to run the app. He should notice when a Flashlight app need access to personal information for example. CNET has concluded that flashlight apps contain more malware than any other app. Sometimes a flashlight is the best flashlight.

Organized crime was the first to create some of the banking apps. People were entering their banking information but then the banking function did not work. By the time they checked in with their real bank, it was too late.

A person can investigate the privacy, source and security for apps he is considering to load on his mobile device by going to whatapp.org. This is a free service run by Stanford University.

Be aware that the apps available through online marketplaces are not necessarily vetted for security or quality. In some cases, no review at all is conducted on offered apps. Only allow automatic updates on trusted apps. The Android app store (Marketplace) has been particularly affected by security problems with its apps according to CNET.

Be very wary of free versions of popular paid apps offered by unknown companies; they are often bait trying to get a person to download spyware, and the chances that they contain malware are high.

What to do?
Many IT experts as also security experts that are trained and certified across all kinds of hardware, software and networks. Today’s multi-device environment invites serious security breaches. Only a computer expert with the right security credentials can help you get your arms around the problem.

About eMazzanti Technologies
With a company name that sounds more like a purebred, high-performance sports car than a IT support and consulting firm, eMazzanti Technologies is all about delivering powerful solutions in a variety of Outsourced IT services, such as cloud computing, managed printing services, PCI DSS compliance, computer network management, network troubleshooting, business continuity and disaster recovery, green computing, mobile workforce technology, information security, cloud computing, cloud computing services, and business information optimization in the most efficient manner possible. The Hoboken, N.J., firm is located in one of the most densely populated - and competitive - regions in the U.S. It provides business technology consulting services for companies ranging from home offices to multinational corporations in the New York metropolitan area, the United States and throughout the world. eMazzanti Technologies is Microsoft's 2012 Partner of the Year for the third year, WatchGuard's Partner of the Year for three years running and made the Inc. 5000 for the third year in a row. For more information contact: Carl Mazzanti 201-360-4400 or emazzanti.net. Twitter: @emazzanti , Facebook: Facebook.com/emazzantitechnologies.