Basic Considerations
Mobile tablets and phones have emerged as the necessary information appliance of the 21'st century. Basically they are simply handheld computers with circutry to connect with wi-fi and cellular networks. Many of these devices allow the installation of applications (apps) that connect with servers on the internet. Most also provide web browsers.
A problem with these devices is that they are often configured in a way that prevents the user from easily managing their security. However a few things can be done to increase your security with these devices.
Backups
Many cellular devices allow for online backups of information in the event that the phone is lost or stolen. This is particularly important as regards telephone numbers and other contact information that might be lost. Check with your service provider.
Emergency cut-off
Many services allow a cellular device to be disconnected in the event of loss or theft. At very least the phone will be unusable. In some cases the phone is also wiped clean, so that personal information cannot be acquired. Again, check with your service provider.
Location apps
There are some apps that can be installed to allow you to locate a lost or stolen mobile device. In some cases the camera or audio can be turned on remotely to identify the person who took the device. These apps can be useful, however it is not wise to try and confront the thief directly. If you are in this situation I recommend contacting the local police.
Anti-malware
Mobile devices have become major targets for hackers, because people use them for online shopping, banking, and more. Some people will use their mobile device to connect with company networks, resulting in network credentials possibly being stored on the phone. Like any computer, it is important to have good anti-malware for your phone.
Here is a list of the best anti-malware apps for Android.
Here is a list of the 9 best anti-malware apps for iphone and ipad
VPN
Many people use their mobile apps while shopping or traveling. They may connect to local-area networks for faster response and to offset cellular data charges. However, this makes them potential targets for man-in-the-middle attacks. For this reason it may be useful to install a Virtual Private Network (VPN) on your device. The VPN creates an encrypted channel between your device and the VPN server (located somewhere in the Internet). This foils any attempt to catch your information from the network, since it is encrypted.
Here is an article on the best VPNs for Android
Here is an article listing the best VPNs for iPhone and Ipad
Jailbreaking or Rooting
Most mobile devices prevent the user from having assess to the underlying operating system. However this protection can be overcome through a process known as 'jailbreaking' or 'rooting' the device. Some people do this so they can install software that is not from authorized servers. I do not recommend doing this unless you know for sure what you are doing. The problem is that a mobile dcevice compromised in this way becomes an easier target for malware, in some cases even allowing 'sideloading' - where a device in your vicinity can load malware on your device without your knowledge.
Considerations for apps
A recent study showed that there are thousands of apps that contain malware, the old trojan horse vector. For this reason I suggest the following when considering apps for your mobile device:
A problem with these devices is that they are often configured in a way that prevents the user from easily managing their security. However a few things can be done to increase your security with these devices.
Backups
Many cellular devices allow for online backups of information in the event that the phone is lost or stolen. This is particularly important as regards telephone numbers and other contact information that might be lost. Check with your service provider.
Emergency cut-off
Many services allow a cellular device to be disconnected in the event of loss or theft. At very least the phone will be unusable. In some cases the phone is also wiped clean, so that personal information cannot be acquired. Again, check with your service provider.
Location apps
There are some apps that can be installed to allow you to locate a lost or stolen mobile device. In some cases the camera or audio can be turned on remotely to identify the person who took the device. These apps can be useful, however it is not wise to try and confront the thief directly. If you are in this situation I recommend contacting the local police.
Anti-malware
Mobile devices have become major targets for hackers, because people use them for online shopping, banking, and more. Some people will use their mobile device to connect with company networks, resulting in network credentials possibly being stored on the phone. Like any computer, it is important to have good anti-malware for your phone.
Here is a list of the best anti-malware apps for Android.
Here is a list of the 9 best anti-malware apps for iphone and ipad
VPN
Many people use their mobile apps while shopping or traveling. They may connect to local-area networks for faster response and to offset cellular data charges. However, this makes them potential targets for man-in-the-middle attacks. For this reason it may be useful to install a Virtual Private Network (VPN) on your device. The VPN creates an encrypted channel between your device and the VPN server (located somewhere in the Internet). This foils any attempt to catch your information from the network, since it is encrypted.
Here is an article on the best VPNs for Android
Here is an article listing the best VPNs for iPhone and Ipad
Jailbreaking or Rooting
Most mobile devices prevent the user from having assess to the underlying operating system. However this protection can be overcome through a process known as 'jailbreaking' or 'rooting' the device. Some people do this so they can install software that is not from authorized servers. I do not recommend doing this unless you know for sure what you are doing. The problem is that a mobile dcevice compromised in this way becomes an easier target for malware, in some cases even allowing 'sideloading' - where a device in your vicinity can load malware on your device without your knowledge.
Considerations for apps
A recent study showed that there are thousands of apps that contain malware, the old trojan horse vector. For this reason I suggest the following when considering apps for your mobile device:
- Only get apps from authorized servers. This ensures that at least someone has approved the app.
- Watch which permissions are requested. I once downloaded a flashlight app and discovered that it wanted access to my media files and contacts. I cancelled installation.
- You may want to google the app to see if anyone has reported any trouble with it.