Halloween is almost upon us, and while we often associate this day with killer clowns, ghosts and the undead, there may be something scarier and nastier right around the corner – Mobile threats. Cybercriminals give new meaning to ‘trick or treat’ by taking advantage of consumers’ risky behaviour to steal personal and financial information through malicious, nasty tricks.
Here are the Top 5 Scariest Mobile Threats:
1. I Know What You Did Because of Spyware – Malware that lurks in the shadows of trusted devices, collecting information around browsing habits, personal information andmore. Private information is unknowingly then sent to third parties.
2. Dawn of the Dead Apps – Old app lying dormant on mobile devices, especially those no longer supported by Google or Apple, can be infected with malware or could potentially be leaking data to a third party.
3. Bone Chilling Botnets – Botnets emulate Invasion of the Body Snatchers, on mobile devices by turning them into “bots” through malware. This bot or bots then become a part of collection of infected internet connected devices, that are used to spread viruses, generate spam, and all sorts of cybercrime.
4. Malicious Click or Treat – Unknowingly clicking link online via a browser or app can allow hackers are to gain access to devices and private information.
5. IoT Follows – Most IoT devices are often connected to mobile devices, so if a hacker is able to gain access to a smartphone, they can infiltrate the target’s connected devices as well. Or vice versa.
Moral of the story: mobile threats can give us all a good spook, especially with global infections of mobile devices that have risen by 8%, led by Asia with 18% according to McAfee. Consumers however can follow these tips to steer clear of cybercriminals’ tricks this Halloween:
· Be a click-buster: Always be on alert when clicking links, especially when they seem too good to be true.
· Update regularly: Whether you’re updating your devices’ software or just simply getting rid of old apps, this practice helps to ensure your device stays secure.
· Get secure: We can’t stress enough how important is to use comprehensive security software to protect your personal devices.
Following these precautions will help consumers keep in the clear from a mobile security breach.
For the LATEST tech updates,
FOLLOW us on our Twitter
LIKE us on our FaceBook
SUBSCRIBE to us on our YouTube Channel!