smartphone owners not smart about securityMobile Security Threats Are On the Rise
Data-stealing malicious apps, phishing attacks, network spoofing, spyware, ransomware, malware, banking Trojans, bots, apps that trick the user into sending premium messages – these are just the tip of the iceberg called mobile security threats.
security threats are evolving each day and increasing in number, however, as
much as smartphones are important in our lives and no matter how aware we are
of the threats, we are not doing the smart thing about their security.
According to Kaspersky Lab, around 323,000 new malware files are being identified each day.
A recent report by Pew Research Center revealed some concerns about smartphone security. Nearly 28% of smartphone users fail to do the most basic thing – use a lock screen on their phones. Moreover, 40% of users only update their apps or operating system at their convenience, while some never update their apps (10%) or operating system (14%). Unfortunately, elderly users are more prone to poor security habits than the younger generations.
Gemalto's Building trust in mobile apps report also shows that users are still not convinced of the need for vigilance when it comes to mobile. Surprisingly, only 53% of people think a PIN or password protects them, just over a third appreciate two-factor authentication, and only 42 percent feel encryption would help.
Although 78% of people claim to be aware of the risks of unknown links in emails, they click them anyway.
Furthermore, the report also notes that users would consider multiple methods of protecting their apps; not a single method, but different methods working alongside each other.
What we need to have in mind is that mobile is presently not reduced to smartphones, but a bunch of different devices as well, such as wearables and webcams, many of which interact with or are controlled by smartphone apps. Even though attacks on mobile phones still account for most mobile threats, they continue to grow and adapt, aware of the potential and vulnerability of many connected devices.