Sorry to break it to you, but your mobile device has a bull’s eye on it! Researchers are devising ways to hack into your device using hardware that is easy to mistake as legitimate. Imagine that you are at the home of an acquaintance, when your phone suddenly runs out of batteries. That spare charger your acquaintance gives you to charge your device could be a tool for injecting malware on your phone. Increasingly clever hacks that take advantage of our trust in others have create opportunities for hackers to steal the personal information we keep on our devices.
Software that tracks our device from remote locations can help us recover a lost phone, but that’s only the beginning of security measures that should become standard to anyone with a smartphone.
Recovery
Applications like “Prey” put a tracking system on your device. It uses geo-location and Wi-Fi positioning to locate your phone and provide remote functions like shutting it down or wiping the device. You can also program the device to take a picture of the thief. Samsung and Apple each offer similar services of their own through security pages you can access once you have your device connected to the network.
Just like a computer, network security protection is important to mobile users. Apps that watch your browsing habits in real-time and inspect files for integrity will keep your device safe from malware designed to leech your information.