Cybercrime’s Most Wanted: Four Mobile Threats that Might Surprise You

It’s
hard
to
imagine
a
world
without
cellphones.

Cybercrime’s Most Wanted: Four Mobile Threats that Might Surprise You

It’s
hard
to
imagine
a
world
without
cellphones.
Whether
it
be
a
smartphone
or
a
flip
phone,
these
devices
have
truly
shaped
the
late
20th
century
and
will
continue
to
do
so
for
the
foreseeable
future.
But
while
users
have
become
accustomed
to
having
almost
everything
they
could
ever
want
at
fingertips
length,
cybercriminals
were
busy
setting
up
shop.
To
trick
unsuspecting
users,
cybercriminals
have
set
up
crafty
mobile
threats

some
that
users
may
not
even
be
fully
aware
of.
These
sneaky
cyberthreats
include
SMSishing,
fake
networks,
malicious
apps,
and
grayware,
which
have
all
grown
in
sophistication
over
time.
This
means
users
need
to
be
equipped
with
the
know-how
to
navigate
the
choppy
waters
that
come
with
these
smartphone-related
cyberthreats.
Let’s
get
started.


Watch
out
for
SMSishing
Hooks

If
you
use
email,
then
you
are
probably
familiar
with
what
phishing
is.
And
while
phishing
is
commonly
executed
through
email
and
malicious
links,
there
is
a
form
of
phishing
that
specifically
targets
mobile
devices
called

SMSishing
.
This
growing
threat
allows
cybercriminals
to
utilize
messaging
apps
to
send
unsuspecting
users
a
SMSishing
message.
These
messages
serve
one
purpose

to
obtain
personal
information,
such
as
logins
and
financial
information.
With
that
information,
cybercriminals
could
impersonate
the
user
to
access
banking
records
or
steal
their
identity.

While
this
threat
was
once
a
rarity,
its
the
rise
in
popularity
is
two-fold.
The
first
aspect
is
that
users
have
been
educated
to
distrust
email
messages
and
the
second
is
the
rise
in
mobile
phone
usage
throughout
the
world.
Although
this
threat
shows
no
sign
of
slowing
down,
there
are
ways
to
avoid
a
cybercriminal’s
SMSishing
hooks.
Get
started
with
these
tips:


  1. Always
    double-check
    the
    message’s
    source.

    If
    you
    receive
    a
    text
    from
    your
    bank
    or
    credit
    card
    company,
    call
    the
    organization
    directly
    to
    ensure
    the
    message
    is
    legit.

  2. Delete
    potential
    SMSishing

    Do
    not
    reply
    to
    or
    click
    on
    any
    links
    within
    a
    suspected
    malicious
    text,
    as
    that
    could
    lead
    to
    more
    SMSishing
    attempts
    bombarding
    your
    phone.

  3. Invest
    in
    comprehensive
    mobile
    security.

    Adding
    an

    extra
    level
    of
    security

    can
    not
    only
    help
    protect
    your
    device
    but
    can
    also
    notify
    you
    when
    a
    threat
    arises.


Public
Wi-Fi
Woes
 

Public
and
free
Wi-Fi
is
practically
everywhere
nowadays,
with
some
destinations
even
having
city-wide
Wi-Fi
set
up.
But
that
Wi-Fi
users
are
connecting
their
mobile
device
to
may
not
be
the
most
secure,
given
cybercriminals
can
exploit
weaknesses
in
these
networks
to
intercept
messages,
login
credentials,
or
other
personal
information.
Beyond
exploiting
weaknesses,
some
cybercriminals
take
it
a
step
further
and
create
fake
networks
with
generic
names
that
trick
unsuspecting
users
into
connecting
their
devices.
These
networks
are
called

“evil-twin”
networks
.
For
help
in
spotting
these
imposters,
there
are
few
tricks
the
savvy
user
can
deploy
to
prevent
an
evil
twin
network
from
wreaking
havoc
on
their
mobile
device:


  1. Look
    for
    password-protected
    networks.

    As
    strange
    as
    it
    sounds,
    if
    you
    purposely
    enter
    the
    incorrect
    password
    but
    are
    still
    allowed
    access,
    the
    network
    is
    most
    likely
    a
    fraud.

  2. Pay
    attention
    to
    page
    load
    times.

    If
    the
    network
    you
    are
    using
    is
    very
    slow,
    it
    is
    more
    likely
    a
    cybercriminal
    is
    using
    an
    unreliable
    mobile
    hotspot
    to
    connect
    your
    mobile
    device
    to
    the
    web.

  3. Use
    a
    virtual
    private
    network
    or
    VPN.

    While
    you’re
    on-the-go
    and
    using
    public
    Wi-Fi,
    add
    an

    extra
    layer
    of
    security

    in
    the
    event
    you
    accidentally
    connect
    to
    a
    malicious
    network.
    VPNs
    can
    encrypt
    your
    online
    activity
    and
    keep
    it
    away
    from
    prying
    eyes. 


Malicious
Apps:
Fake
It
till
They
Make
It

Fake
apps
have
become
a
rampant
problem
for
Android
and
iPhone
users
alike.
This
is
mainly
in
part
due
to

malicious
apps

hiding
in
plain
sight
on
legitimate
sources,
such
as
the
Google
Play
Store
and
Apple’s
App
Store.
After
users
download
a
faulty
app,
cybercriminals
deploy
malware
that
operates
in
the
background
of
mobile
devices
which
makes
it
difficult
for
users
to
realize
anything
is
wrong.
And
while
users
think
they’ve
just
downloaded
another
run-of-the-mill
app,
the
malware
is
hard
at
work
obtaining
personal
data.

In
order
to
keep
sensitive
information
out
of
the
hands
of
cybercriminals,
here
are
a
few
things
users
can
look
for
when
they
need
to
determine
whether
an
app
is
fact
or
fiction:


  1. Check
    for
    typos
    and
    poor
    grammar.

    Always
    check
    the
    app
    developer
    name,
    product
    title,
    and
    description
    for
    typos
    and
    grammatical
    errors.
    Often,
    malicious
    developers
    will
    spoof
    real
    developer
    IDs,
    even
    just
    by
    a
    single
    letter
    or
    number,
    to
    seem
    legitimate.

  2. Examine
    the
    download
    statistics.

    If
    you’re
    attempting
    to
    download
    a
    popular
    app,
    but
    it
    has
    a
    surprisingly
    low
    number
    of
    downloads,
    that
    is
    a
    good
    indicator
    that
    an
    app
    is
    most
    likely
    fake.

  3. Read
    the
    reviews.

    With
    malicious
    apps,
    user
    reviews
    are
    your
    friend.
    By
    reading
    a
    few,
    you
    can
    receive
    vital
    information
    that
    can
    help
    you
    determine
    whether
    the
    app
    is
    fake
    or
    not.


The
Sly
Operation
of
Grayware

With
so
many
types
of
malware
out
in
the
world,
it’s
hard
to
keep
track
of
them
all.
But
there
is
one
in
particular
that
mobile
device
users
need
to
be
keenly
aware
of
called

grayware
.
As
a
coverall
term
for
software
or
code
that
sits
between
normal
and
malicious,
grayware
comes
in
many
forms,
such
as
adware,
spyware
or
madware.
While
adware
and
spyware
can
sometimes
operate
simultaneously
on
infected
computers,
madware

or
adware
on
mobile
devices

infiltrates
smartphones
by
hiding
within
rogue
apps.
Once
a
mobile
device
is
infected
with
madware
from
a
malicious
app,
ads
can
infiltrate
almost
every
aspect
on
a
user’s
phone.
Madware
isn’t
just
annoying;
it
also
is
a
security
and
privacy
risk,
as
some
threats
will
try
to
obtain
users’
data.
To
avoid
the
annoyance,
as
well
as
the
cybersecurity
risks
of
grayware,
users
can
prepare
their
devices
with
these
cautionary
steps:


  1. Be
    sure
    to
    update
    your
    device.

    Grayware
    looks
    for
    vulnerabilities
    that
    can
    be
    exploited,
    so
    be
    sure
    to
    always
    keep
    your
    device’s
    software
    up-to-date.

  2. Beware
    of
    rogue
    apps.

    As
    mentioned
    in
    the
    previous
    section,
    fake
    apps
    are
    now
    a
    part
    of
    owning
    a
    smartphone.
    Use
    the
    tips
    in
    the
    above
    section
    to
    ensure
    you
    keep
    malicious
    apps
    off
    of
    your
    device
    that
    may
    contain
    grayware.

  3. Consider
    a
    comprehensive
    mobile
    security
    system.

    By
    adding
    an

    extra
    level
    of
    security
    ,
    you
    can
    help
    protect
    your
    devices
    from
    threats,
    both
    old
    and
    new.

Introducing
McAfee+
Ultimate

Identity
theft
protection
and
privacy
for
your
digital
life

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.