The Six Most Common Threats Against The Device That Knows You Best

InfosecTrain
0

Aside from your partner, children, or parents, what is the most intimate relationship in your life? It's our cell phone for many of us. It's the last thing we see before going to bed, and it's usually the first thing we pick up in the morning. Therefore, the platform that is constantly connected, always-on, and almost always within inches of our bodies must be protected.

Let's look at the six threats that we see most frequently in the mobile landscape:

1.      Malicious Apps

While the number of malicious apps targeting mobile devices is lower than desktops, these apps are common, particularly those targeting the Android platform. The number of malicious apps detected in Android endpoint protection has steadily increased over the last year. The malicious app seen includes words like Chrome, voicemail, and video player.

2.    Phishing

Mobile phishing attacks, also known as smishing, do not only target a device via SMS. They can also be directed at other popular messaging apps, such as WhatsApp or Facebook Messenger. These attacks, posing as technical support, solicit credentials over the phone or trick users into installing remote access tools on a mobile device or a computer. On the mobile phone, we also see vishing (voice phishing).

3.    Calendar Spam

ICS or iCalendar files, which are used to schedule events and meetings on Apple devices, are used by spammers to target iOS devices. These files can also be used to sign up for calendar subscriptions. When you click on an event in one of these spam calendars, you may be taken to a page with malicious links or scams. Users will be invited to calendars that are filled with spam, effectively rendering the calendar useless.

4.   Overlays

Overlays feature allows apps to be stacked on top of each other. This strategy isn't for the faint of heart. Consider a banking app with a malicious app overlaid on it, but only in the credential area. As far as the user is concerned, the credentials entered appear to be sent to the banking application. They are, however, heading straight for the perpetrator. 

  1. Spyware

Zero-click exploits of vulnerabilities can infect a device via a phone call or a text message. That is all it takes for the exploit to enter the system, execute the payload, and install spyware. Other exploitations require only a single click. The payload is executed as soon as a message is opened.

6.    Stalkerware

Stalkerware is another threat that looks and acts like spyware but poses a far greater threat to the average user. These apps have features such as pinpointing a device's exact location, reading SMS messages, taking photos or videos, and recording conversations.

How Can InfosecTrain Help You?

When it comes to the security issues in any organization’s IT system that must be identified, InfosecTrain understands the importance of professional training to help you combat these attacks and threats. Visit our website for State-of-the-art training programs in Information Security and Cyber Security to jack up your security acumen both personally and professionally!

Post a Comment

0Comments

Post a Comment (0)