Simple steps to secure your smart phone data

TipsMake.com - You may already know the basic knowledge of Internet security and keep personal data from being compromised when browsing the Web such as: Using a firewall, do not open attachments without your knowledge. Clearly, do not click on links given by strangers. But what about your smart phone? In his speech on Android phones and botnets in the framework of the security conference ShmooCon 2011, Georgia network security expert Weidman said: "Anyone interested in securing personal data is saved. store on your smartphone, think carefully before downloading unclear or unreliable applications ".

So how can botnets spread on smart phones? (Botnets are malicious software that allow an attacker to actively control your computer to connect to a particular server.) First, the victim needs to download a file containing a 'bot '- is a malicious code. This code will install a 'bot' into the phone's basic operating system. The infected files can be an application, a music file or even an email attachment. " It can be disguised in anything, " Weidman said. " Someone absolutely can offer a great application with the functions that users want. Worse, these applications can be disguised as such ads so no one will doubt it. , and so botnets can survive for years ".

Simple steps to secure your smart phone data Picture 1

Case study: How Geinimi Botnet spreads Geinimi (based on the help of mobile security firm Lookout).

Once your phone is infected, a bot slave program will be installed in the basic operating system, hiding under the application layers that most users are familiar with. Since then these programs can monitor and modify all data sent to and from your smart phone, allowing the host bots (botmaster) to command and control your phone without your knowledge. . " Because these bots know all the information before the user knows, it can capture personal data and move it anywhere on the Internet, " Weidman said. " What you did, the people you were talking to and where you were ."

Once the botmaster has taken control of your phone, its first priority is to infect as many other users as possible. In the past, mobile botnet took advantage of Internet access of smart phones to spread malicious code via email; but the Android botnet that Weidman mentioned here is much more dangerous because it communicates and spreads via SMS. Weidman said the attack via SMS messaging service is far more efficient and sophisticated than accessing the Internet via the phone's modem. In addition, it opens up new attacks, whereby users can receive text messages from a friend whose botnet is infected with links to malicious codes.

" If I receive a text message from a friend with a link that says" this, try this link , "" why don't I trust it? "Mrs. Weidman said. " If someone in my contacts is infected with a botnet, they can cause infection to me without them knowing . 'Of course, the malware in smartphones is nothing. new, security companies such as Symantec and Lookout have provided malware detection apps for iOS and Android operating systems and remote security features like locking or scanning phones via SMS But the mobile market segmentation with many different manufacturers as well as different products often makes it difficult for security companies to keep their applications up to date with each malware. Worse, most software detects only scanning other applications to find malicious codes and cheat. They will find those applications but they can almost do nothing if these bots have overwritten a portion of the phone's operating system. Her botnet model on Android operating system, she thinks that bots can work on any smart phone. Currently, she is testing on iOS and Windows Phone 7 operating systems.

Simple steps to secure your smart phone data Picture 2 Weidman's security studies seem to be worrisome, but this is just research. " If this type of attack becomes popular in the future, we will update the software to detect it, " said Kevin Mahaffey, technology development manager for security firm Lookout. " Unless we see malware like this in reality, we will continue to focus our efforts on current threats first ."

In addition, a fairly simple task to protect your smartphone and avoid your data being botnet is that you just need to use security software for the iPhone and Android seriously. like on your laptop. Do not download applications or files from people you do not trust, and be wary of any links or files attached to text messages. Remember that any file you download to your phone is likely to be infected with a botnet.

5 ★ | 1 Vote

May be interested

  • How to Blog Using Your Smart PhoneHow to Blog Using Your Smart Phone
    in today's world of continuous, ever-advancing technology, most smart phones now provide you with the ability to publish blog posts directly from your smart phone. most blogging platforms contain settings that you can modify for the...
  • Super secure SIM card, only connecting data via Tor anonymity network helps protect information for usersSuper secure SIM card, only connecting data via Tor anonymity network helps protect information for users
    this super-secure sim card can block bandwidth without connecting tor out of the phone. this means that, when using this sim card, all mobile data bandwidth on the phone must go through the tor network.
  • How to completely delete data on the computer?How to completely delete data on the computer?
    completely erasing the data on the computer is essential, especially before selling the device or deleting sensitive data permanently, not wanting to store any more. how to delete data that cannot be recovered? please refer to this article.
  • How to Check Voicemail from Another PhoneHow to Check Voicemail from Another Phone
    it may be a bit hard to imagine, but there will be times when you don't have your phone with you and need to check your voicemail. today, most carriers have simple procedures that allow people to access their voicemail when using another phone. checking your landline voicemail with another phone follows the same simple steps. to check voicemail from another phone, you need to call your number, press the star or pound key (depending on the carrier), and then enter your pin.
  • 6 simple ways to backup phone numbers in Android phone contacts6 simple ways to backup phone numbers in Android phone contacts
    contacts are one of the most important data on your phone and what happens if you accidentally lose all your contacts or lose your phone. meanwhile, the entire contact phone number in your contacts will not fly but fly. therefore, in order to avoid possible bad situations, it is best to back up your phone contacts on accounts or other secure storage devices such as memory cards and computers.
  • Backup and restore data on Windows Phone 8 deviceBackup and restore data on Windows Phone 8 device
    steps to set up recovery and backup on windows phone 8 devices are made easily via cloud account to help control application lists, messages, contacts, photos and videos ...
  • Create Excel charts that automatically update data with these three simple stepsCreate Excel charts that automatically update data with these three simple steps
    excel charts help shorten the decision-making process, because we can immediately see the results and things to change. however, the difficulty in processing data and charts is that users must constantly return to the chart and update new data. yes, this problem will be gone when you follow these three simple steps to create an excel chart that automatically updates data.
  • How to use child lock mode on Smart TV LG WebOS operating systemHow to use child lock mode on Smart TV LG WebOS operating system
    on the lg smart os webos smart tv line, the child lock feature helps families with young children to control tv applications or programs.
  • 10 good habits to help secure smart phones10 good habits to help secure smart phones
    it will be difficult for technology employees to control what users will do with their smartphone device - and also keep them from exposing business data from security threats.
  • Instructions for connecting pull speakers with Smart TV to sing karaokeInstructions for connecting pull speakers with Smart TV to sing karaoke
    singing karaoke at home on smart tv and loudspeaker is now quite popular, only need a few simple steps that users can connect the speaker and tv to sing karaoke at home with extremely sound quality, no less next to the luxurious singing rooms outside the shop. so how are the steps connected? invites you to read the track.