Tag Archives: Data

iPhone Users Vulnerable to Data Theft

iPhone Users Vulnerable to Data Theft

While the iPhone is the undeniable king of smartphones, security flaws in the operating system create vulnerabilities hackers can exploit to steal email, contact and personal data. Surprisingly, smartphone users are seemingly unaware of data security issues with their cellular phones. According to a recent Trend Micro report, respondents (44%) feel surfing the internet on their smartphone is just as safe as surfing the web on their computer, despite the fact that most smartphones offer no internet surfing security. What can you do to protect your iPhone? Use these tips:

1. Wifi Hotspots Attract Hackers – those bent on maliciously collecting information from laptop and smartphone users know that wifi hotspots offering broadband internet access to anyone are great places to troll for the unprotected equipment. When surfing at your local hot spot, make sure you know whose network you are connecting to. Reference the name of the hotspot and ask yourself if the name makes sense with the location. For instance, all Starbucks have a hotspot named “att” that requires validation through the iPhone’s Safari internet browser. Connecting to any other wifi network increases your risk of data theft.

2. Wifi Hotspot Login Page – many wifi hotspots require you to accept terms of service and login to a web page on your internet browser. While checking a box to accept terms of service is rather innocuous, no other information is typically collected (such as name, address, credit card number, etc) so be wary of any login process requesting such information. Also (more applicable to laptops) if the login page seems to be taking an extraordinary amount of time to load or appears to be loading a large file to your laptop or smartphone immediately disconnect your wireless internet connection as malicious software may be downloading to your device.

3. Password Protect Your Data – most smartphones provide a feature to password protect your device and the data inside it. This is typically enabled in a settings panel on the phone and requires the owner to enter a password before gaining access to phone data and functionality. While this might be annoying it is a great way to protect your data from theft, especially if your phone is lost or is left unattended in public for an extended period of time.

4. Layered Protection – exercising caution when connecting with wifi hotspots and password protecting your data is a great start, but you can increase your data protection with additional layers of security such as the Trend Micro application Trend Smart Surfing freely available on the iPhone application store that blocks users from accidentally visiting a site that could exploit an iPhone vulnerability.

These simple steps will greatly increase data security on your smartphone device and better protect you from identity theft. Also be certain to regularly update your smartphone or iPhone to receive the most up-to-date security patches made available from hardware manufacturers.

Protecting Customer Data From Fraud Attacks

Protecting Customer Data From Fraud Attacks

Businesses must stand strong against data attacks and show they have stringent measures in place to protect customer information. If they don’t they are at risk of losing customer trust and affecting the reputation of the company not to mention liable for fines and possible court action as a result of data loss. Complaints from customers and the fines are large as well as the bad press associated with data loss exposures can severely affect profits, something no company wants to happen and with the current economic climate is more important than ever to avoid by victims of fraud.

Companies need to have security measures in place that are tried and tested that are sufficient enough to protect data from previously used hacker scam attack techniques. It is therefore important that companies keep up to date with the latest technologies and methods used so they don’t become the latest casualty of fraud schemes. The latest threats are coming in through phishing websites and spam e-mails, in order to protect customer’s personal data and corporate property, companies should have up to date technology that will intervene and stop these types of attacks happening.

Companies are responsible for protecting information as well as the employees of the company. All employees should be aware of cyber criminal activities and should follow corporate policies that explain what not to when using internet and company e-mail.

If you are looking to protect your business it is worth noting that web based e-mail is the preferred e-mail type for internet attacks due to there anonymity.

Social networks are increasingly being used as a way for hackers to launch their attacks. Scammers will pose as “friends” such as asking to make new friends and will have a picture of a beautiful girl as their profile picture. Then they will send links at appropriate times such as about Michael Jackson at the moment. The scam works by hoping the user will be lured into clicking through to a malicious website. Sales of phising tools have increased greatly on the internet and it is possible for anyone to buy kits to allow them to pursue criminal schemes and rip off individual details to them sell on to professional fraudsters without needing any experience.

To protect your business it will be worth attending a security related business seminar that details issues such as fraud schemes and scams. Marcus Evans scam conferences regularly run so check out the details for when the next conference is scheduled.