Mobile Phone Security Tips for a Safer 2020

06 Feb 2020 - Category: Blog /
seguridad movil

Mobile phone security breaches are the most rampant, something that even Zynga, the popular gamingapplication developing company could not escape. If you are even remotely interested in cybersecuritynews, then you must have heard of the two mobile phone security breaches Jeff Bezos iPhone hackwhich led to a $38 Billion divorce and Zyngas data theft that compromised the data of over 170 millionusers.

A Snapshot of Jeff Bezos and his iPhone security breach

Ever since the personal data of Amazons Chief Jeff Bezos was leaked, mobile phone security hasbecome one of the top security concerns. Bezos had reportedly received a malicious link from the CrownPrince of Saudi Arabia, which caused the breach. However, it is unknown whether the Crown Prince wasaware of the malware in the link while forwarding the same to Bezos, which subsequently resulted in hisdivorce.

The Zynga Saga

Zynga, the California-based gaming applications maker, known for popular online gaming applicationssuch as Farmville, Zynga Poker, and Words with friends recently went through a disastrous securitybreach. GnosticPlayers, a Pakistan-based Hacker took responsibility for this massive security breach thataffected close to 170 million users.

In this breach, personal details such as email IDs, phone numbers, etc were stolen by cybercriminals.Also, the passwords of close to 7 million users were exposed by the miscreants. Therefore, we considerit our duty to inform and educate you about mobile phone security. So, if you have been worried sickabout your personal data, then here are some useful tips that can help prevent mobile phone securitybreaches.

Why should you ensure Mobile Phone Security?

According toreports, one out of every 36 mobile devices contains one or more high-risk applicationsinstalled in it. Cybercriminals create certain malicious applications and upload them on app stores totarget unsuspecting users. At times, these cybercriminals do not create a new app but insert maliciouscode into an existing mobile application, which happened in the case of Zyngas gaming applications.

However, there have also been instances wherein an OS update that was digitally signed by Asus, turnedout to be malicious. No matter which mobile phone security concern has got you worried, we shall nowhelp you fix it before its too late. Let us now discuss some of the most common factors that caninfluence mobile phone security.

Mobile Phone OS Updates

Until the Asus update, there was nothing safer than a digitally signed OS update, but cybercriminalshave changed that perception. So, whenever an OS update is released, avoid installing it immediately.Instead, dig deeper into the issues that the update claims to address and wait for a while. If there is aproblem with it, then someone might report the bug and the security team would stabilize the update.

You may have heard of the adage Slow and steady wins the race this is absolutely true in the caseof OS updates. However, if you have downloaded a faulty OS update, consider backing up your data andreverting to your phones factory settings. You can do this by navigating to your phones settings andhitting the Reset to Factory Mode option. However, this would revert all your applications to theFactory version, so make sure to backup your data before reverting.

Updated Active Antivirus

Installing an antivirus toprotect your data is a time-tested mobile phone security measure. Most peopleundermine the power of an antivirus, which can be easily installed on their mobile phones. However,you must regularly update your antivirus, as new threats are identified and updated almost every singleday.

Reputed cybersecurity companies like Norton, Symantec and Kaspersky rolls out regular updates to keepyour devices safe. So, if you use a smartphone, make it a point to have an antivirus in your phone andinstall regular updates.

Be careful about the links

Most people use WhatsApp and other chat engines to exchange third-party links, which may or may notbe safe. This may have been the case when a malicious link was forwarded to Jeff Bezos by Mohammad-Bin-Salman. However, we do not know if the Crown Prince of Saudi Arabia innocently forwarded amalicious link to Bezos or was it pre-planned.

If your privacy is dear to you, then you must be extremely cautious about the links that you click on.Malicious third-party links could transfer control to an external server. This is precisely what may havehappened with Jeff Bezos, if it was indeed a malicious link that caused the leak.

Avoid Public WiFi

Public WiFi makes it convenient for you to communicate when you are in public places. However, PublicWiFis are the number one reason for Man-in-the-middle attacks because every request that you send,reaches someone else before the server receives it. So, even if you use public WiFis, avoid the exchangeof sensitive data.

Avoid Jailbreaking or Rooting

Apple prioritizes mobile phone security over everything else, but most people end up exposingthemselves to mobile security threats by jailbreaking. A similar action performed on Android phones iscalled Rooting. Although this allows you to use other applications, jailbreaking and rooting messes upthe pre-existing security measures on the phone.

Mobile devices play a significant role in our lives as we depend on it for almost everything fromphone banking to booking a cab. Small World knows how important mobile security is for our customersand therefore we remain GDPR and PCI compliant. So, our customers need not bother about theirmobile phone security. Just make it a point to follow the above-mentioned mobile phone securitymeasures, and that can help you protect your data considerably.

At Small World, we use own and third-party cookies to give you the best browsing experience possible, as well as being able to analyse your browsing behaviour. You can accept all cookies by clicking the "ACCEPT ALL COOKIES" button or configure or reject their use by clicking the "COOKIE SETTINGS" button. Click on our Cookie Policy for more information.