Cyber World’s Activities & Risks: Mobile

Using mobile devices

Risks to mobile phones, especially smartphones and Bluetooth-enabled phones, are becoming increasingly common. Aside from the actual physical loss of your mobile phone, which could put personal information in the wrong hands, there are several ways your mobile phone can be compromised.

What are the risks?

  • Viruses or worms can be spread through anything you download from the Internet via your phone, by text attachments (MMS, which means multimedia messaging service) and by Bluetooth transfers.
  • Phishing by phone is another way cyber criminals scam you. They’ll send a text or email with a phone number for you to call to verify account information. They may also call you directly and ask you to enter your account number before continuing.
  • Trojan horses attached to app downloads can delete your files and record personal information you’ve entered (like a credit card number on an online shopping site). Do not install apps that seem to require an unusual amount of information from you.
  • An unsecure wireless network can compromise your information, including your contact list, as well as give someone else use of your data plan. Using your 3G connection is a safer option.
  • Mobile phones are small and can easily be stolen, potentially putting your stored usernames and passwords in the wrong hands.
  • Prompts from companies you don’t recognize may ask you to update, install or run software that could contain malicious software.
  • Text messages sent to basic phones that contain malware can shut down or completely crash your mobile phone.
  • Your mobile device could be cloned by clever criminals who copy the serial number to another phone and make fraudulent calls you’re charged for.

Security risks to mobile devices are increasing. Of course, you don’t have to stop using your mobile phone, but it’s important to learn everything you can about mobile Internet security to stay protected.

Signs your mobile phone has been compromised

  • You receive charges to your phone bill you don’t recognize.
  • There are emails and text messages in the sent folder that you didn’t send
  • The user interface has changed meaning the appearance of your phone or the way you perform functions has been altered.

If you think your mobile device has been infected with malicious software, call your manufacturer or service provider.

Disclaimer: We use contents from reliable sources from respective authors& websites. We valued their contents and give full credits to them for the same. We are not claiming any honourship or rights of the provided contents. We are not liable or take any responsibility for any provided information. The purpose of this web site is noncommercial and welfare of the society.