The security of a smartphone starts with its owner

Smartphone owner? There is no doubt that smartphones and tablets have become the preferred target of cybercriminals lately. Billions of smartphones were sold, so searching for security blanks and exploiting them has become a top priority for fraudsters.smartphone smartphone smartphone smartphone smartphone

IOS is no longer 100% safe, as the number of malware and cyber attacks targeting Apple's mobile platform has risen steadily in recent years.

From the first worm for iOS (the Ikee) discovered 2009, which just changed the wallpaper of the device with one of Rick Astley, the iOS platform has been targeted by many malware
.
IOS is no longer the safest choice in mobile technology

Μια μελέτη της Arxan Technology έδειξε ότι το 87% από τις 100 κορυφαίες (επί πληρωμή) εφαρμογές για iOS έχουν κλωνοποιηθεί για υς σκοπούς, και διανέμονται μέσω ανεπίσημων διαύλων.

Οι Jailbroken συσκευές είναι πιο εύκολο να παραβιαστούν και υπήρξαν ο στόχος του Xsser remote Trojan (RAT) το 2014. Οι ερευνητές ασφάλειας από τη Lacoon Mobile Security they found it distributed through a Whatsapp message to Hong Kong demonstrators to steal personal data such as contacts, texts, or call logs.

However, non-jailbroken devices are no longer a security guarantee. 2014 a malicious software called Wirelurker was discovered in a third-party Mac app that hit the computers and waited until an Apple device was connected. So she could break her and intercept personal information.

Last year, his researchers FireEye found a vulnerability in iOS that allowed a malicious application signed with a company certificate to replace the package ID used to verify app updates. This defect was named Wirelurker.

The XAgent, is another malware that primarily affects iOS versions prior to 8,0, and has been used for cyber-spying. The goal of malware is to steal contacts, text messages, and geo-location information from targeted devices. It could also be used to start voice recording on the device.

Threats and attacks designed for the iOS platform may not be as widespread as those for Android, but they are sure to start increasing in frequency.

Meghan Kelly of security company Lookout says that "today, iOS malware is very similar to 2010 Android malware" and that the landscape of threats to Apple gadgets is almost the same as that observed for the mobile operating system Google five years ago.

Security researchers Bluebox have tested a series of nine different Android tablet tablets for children, and found that virtually all of them had different types of vulnerabilities.

Είναι σημαντικό να σημειωθεί ότι οι εν λόγω συσκευές πρέπει να συμμορφώνονται με τους νόμους προστασίας της ιδιωτικής ζωής (Children's Online Privacy Act – COPPA) που εμποδίζουν την παρακολούθηση και τη συλλογή δεδομένων. Επιπλέον, διαθέτουν ειδικό λογισμικό για την προστασία του λογαριασμού του παιδιού στο gadget έτσι ώστε να περιορίζει τις αλλαγές που δεν έχουν εγκριθεί από τον κηδεμόνα-διαχειριστή.

The study showed that more than 50% of the tablets had a backdoor that passed the security mechanisms and allowed the root of the device, which allows it to be completely controlled.

In addition to two products, they all had pre-installed third-party stores, increasing the risk of malware coming in from the internet as these markets do not carry out strict controls on their applications.

Another risk discovered by the researchers was that all tablets were susceptible to at least three major ones points (Futex, ObjectInputStream and BroadAnywhere), which could be used by a malicious user.

However, the biggest risk in the case of Android, as reported by Bluebox, discovered it in one smartphone Mi4 LTE manufactured by Xiaomi.

Researchers bought the device from a retailer in China and tested its safety. The results were so incredible that the researchers believed they sold a fake device. As it turned out, the phone was real, but the software had received interventions from the distribution chain.

The result was a device that included adware and malware and was run with a customized copy of Android vulnerable to Masterkey, FakeID, and Towelroot (Linux futex). In addition to this, the phone was rooted.

Xiaomi, of course, hastened to give explanations when Bluebox published the survey, saying the device was probably tainted by an unofficial retailer from their distribution chain.

All of the above shows that users should also take action to protect their data on portable devices

Everything has become more organized and malicious users seem to constantly invent new attacks that are hard to find by an average user.

An alternative for a secure Android is to directly replace the operating system with one that has been tested by an authorized and trusted source, such as images provided by Google or CyanogenMod.

With iOS, in addition to avoiding jailbreaking, users should avoid suspicious links or downloads of applications from unknown sources.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).