Solution:
2. SMS Phishing. Cyber criminals send SMS messages pretending to be an organization you trust, such as your bank. They exploit this trust to get what they want. These messages are lies designed to trick you into giving your information, do not trust any message that asks you for your personal information.
3. Bluetooth: You must be careful how you setup Bluetooth. Be sure to enable Bluetooth only when you need it. In addition, make sure your phone is configured not to be discoverable. This is especially important when you are traveling in public places, such as airports, hotels or restaurants.
4. Applications: Mobile devices these days combines the functionality of a phone with the power of a computer. Because of the complexity of smart phones, they share many of the same risks as computers. Just as with a computer you must be sure you install, configure and use your applications securely.
- Only install applications you absolutely need. The more applications you install, the more likely one of them has a vulnerability, exposing you and your information to danger.
- Only install well known applications from trusted sources.
- Never install applications advertised by SMS messages.
- Once you install applications on your smart phone be sure they are configured securely.
Disposing Your Mobile:
Many people replace their mobile phones almost every year. Before you dispose your mobile phone make sure to:
- Delete all the data on your phone (such as photos, contact information, phone call records, SMS messages, etc).
- Then overwrite this information with very large files (such as movies). Then delete the large files you just installed.
This process will ensure your information is securely destroyed
0 comments:
Post a Comment