November 10, 2021
Best Encrypted Messaging Apps in 2024
On the surface, it might seem like your personal texts and instant messages are private, but [...]
WHAT’S IN THIS REVIEW?
There are almost 15 billion mobile devices in existence today, which averages out to about two devices per person worldwide. This creates quite a large cybersecurity problem. While the number of total mobile attacks has declined year over year, attacks have become more complex in nature with zero-day exploits seeing a 466% increase in 2021, effectively canceling out the former.
In this post, we’ll analyze the most common forms of cyberattacks and the steps you need to take to maintain iOS and Android security.
“In 2021, there was a 466% increase in exploited, zero-day vulnerabilities used in active attacks against mobile endpoints.”
Zimperium , Global Mobile Threat Report
In general, there are three attack vectors regarding mobile devices. Each represents a specific endpoint through which bad actors gain access to valuable information, or in some instances, take over the device itself.
Bad actors commonly use unsecured WiFi networks to siphon user data. In some instances, attackers will go as far as to spoof a network (create a fake network) that mimics a legitimate one. A spoofed network will usually prompt users to create an account, allowing the attacker to obtain the user’s email along with any data passed through the network.
Attacks through mobile applications are becoming increasingly complex. Applications are frequently at the core of mobile device vulnerabilities, due to the amount of data shared, built-in vulnerabilities, or excessive permissions given by the user. Attacks such as these typically occur through user error, with the user downloading a malicious app leading to malware on iPhone or Android devices, or over-granting device permissions.
This attack form usually takes shape through either phishing, smishing, or spoofing. Essentially, these attacks are carried out through a message, whether it be an email, text, or call. The attacker presents themself as a legitimate entity, but the delivered message contains malicious files, code, or prompts for the user to enter personal data.
As illustrated, there are several ways a mobile device can be compromised. One of the most important pieces of security is being aware of current cyber threats. Through the attack vectors listed above, these are the most common forms of cyberattacks seen in the last year:
Free public WiFi, like the ones accessed in coffee shops, airports, and restaurants, can be found everywhere. Countless users connect to these networks every day, especially with the rise of the workcation. Many are drawn to using them because it avoids consuming personal mobile data, but often this comes at a cost. Nearly all of these networks are unsecured and provide a path for attackers to obtain user data.
To avoid or minimize the risk, avoid connecting to a public network that requires login credentials or account creation.
It’s good practice to refrain from engaging with banking apps, email, online shopping. As a whole, avoid anything that deals with important personal information when using public networks. If it is necessary to use one of these networks, using a security-focused VPN like Surfshark will encrypt your traffic and prevent attackers from snooping.
While it may be obvious that applications downloaded outside of official Android or Apple app stores present a clear risk, danger still lurks within these official stores. There are many examples of apps that exist within these official stores which contain Android or iPhone malware or have predatory data collection practices.
Many new, and some old, banking and gaming malware types have cropped their heads up in 2024. Additionally, with the growth of bring your own device (BYOD) policies, data breaches can happen through infected organizational apps.
To mitigate attacks from apps, only download from official Android or Apple stores, or other verified vendors.
On top of that, be extremely scrutinous about which permissions apps are given, especially location, microphone, and camera access. Additionally, the use of a mobile VPN will add in crucial encryption and malware protection.
Phishing and smishing have become extremely prevalent on mobile devices. With clearly faked corporate logos or poorly written messages easily exposing malicious intent, these attacks can be obvious. However, they aren’t always conspicuous and can catch users off their guard.
Due to their physical size, mobile devices often display less information per message compared to a desktop. This may obscure some of the more obvious signs of a faked or spoofed message. Attackers will also often use emotional calls to action, using a sense of urgency or penalty to get the victim to act without thinking.
It goes without saying, but never engage with an email or text message if even the slightest bit of suspicion arises.
Instead, observe the sender’s email address or phone number. Verify the sender’s information against the source they claim to originate from.
On top of this, check the veracity of a link through Google Safe Browsing. This is a tool that will check if the site in question has hosted malware in the last 90 days. Once confirmed as a bad actor, flag and block the sender.
Aside from making efforts to prevent the most frequent attacks, there are fundamental actions users can take to maintain good cybersecurity. Using these tips daily will maintain a strong base of security with minimal effort:
Although the number of mobile device attacks fell last year, attackers are advancing their approach with more zero-day exploits. In 2021, 75% of all phishing sites targeted mobile users. Even previously secure platforms like iOS are becoming more vulnerable. The Apple OS accounted for 64% of all mobile-specific zero-day attacks last year. Google recently removed 8 applications from its store containing a virus that allowed attackers to take control of devices, giving access to banking information, credentials, and more.
As a whole, it’s clear that the mobile threat environment is evolving. Upgrading mobile protection, like installing an Apple or Android mobile VPN, and keeping good cyber hygiene is absolutely vital to keep your information secure against modern attackers.
We recommend Surfshark VPN for Apple and Android devices.
WHAT’S IN THIS REVIEW?
Cookie | Duration | Description |
---|---|---|
__cfduid | 1 month | The cookie is used by cdn services like CloudFlare to identify individual clients behind a shared IP address and apply security settings on a per-client basis. It does not correspond to any user ID in the web application and does not store any personally identifiable information. |
cookielawinfo-checkbox-advertisement | 1 year | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Advertisement". |
cookielawinfo-checkbox-analytics | 1 year | This cookies is set by GDPR Cookie Consent WordPress Plugin. The cookie is used to remember the user consent for the cookies under the category "Analytics". |
cookielawinfo-checkbox-necessary | 1 year | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-non-necessary | 1 year | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Non-necessary". |
cookielawinfo-checkbox-performance | 1 year | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 1 year | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-functional | 1 year | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-others | 1 year | No description |