5 tips to keep your mobile devices safe while using 3/4G and LTE

Having tablets and smartphones dominating the market has been the main motivation for IT companies to boost the 3/4G  and LTE technologies. This will significantly improve user connectivity but also will raise the risks levels in terms of security. These new technologies require that we have to pay more attention to our terminals in order to avoid significant risks to our security. Mobile devices usually don’t have security software or URL filtering for various reasons and the result is a greater chance of falling victim to fraud and online attacks.

Here are 5 tips that will make your mobile computing experience safe:

 1.       Protect your device against phishing

The main feature of 4G is a faster Internet connection. This causes users to decide to take steps in online banking, such as shopping, booking and payment network outside of the fixed link. The main dangers of these efforts are the possibility of hacking our account and get our credentials. The easiest and most portable way to protect your mobile device against malicious websites is to change the DNS server of the device with that of OpenDNS. Check their website for instructions how to do this for most common mobile devices.

2.       Pay attention to short links (short URLs) circulating in social networks, especially on Twitter

Mobile users are not used to short web addresses. This way of linking content has grown exponentially especially since Twitter appeared because of the need to short the post. This means that there is no visual control of the full addresses until we click on the link, which increases the probability of being infected with malware attached to the link. The easiest way to protect against this kind of URLs is the same as for the phishing websites. Malicious websites in general use shorted links to hide their real URL.

3.       Keep a track on your applications

A faster connection will allow you to download easily more applications for your device, so you must be very careful. The main route used by malware to infect your terminal is masked behind an application. It is highly recommended to pay attention when you install it and always do it from the official markets (Play Store for Android and iOS App Store for iPhone).

4.       Control the exchange of files with your contacts

A faster connection speeds up data exchange and encourages users to share more content from their mobile devices. Check with an antivirus the files that you receive from your instant messaging contacts (such as WhatsApp, Skype) so that they are not infected by malware that can endanger your personal safety or make your terminal unusable.

5. Install and keep active a remote wipe solution

In case your device gets stolen or lost, you can use its permanent online functionality and issue a remote wipe of the device. If you lose the device doesn’t necessarily mean that you must  give the private data as well.

 

Of course, these tips can be also used while using your mobile device via WiFi. Do not forget that accessing the Internet via a router may add additional risks.Here are additional tips about security your mobile device.

Sorin Mustaca

IT Security Expert

from Avira – TechBlog http://techblog.avira.com/2013/11/08/5-tips-to-keep-your-mobile-devices-safe-while-using-34g-and-lte/en/
via IFTTT


© Copyright 2013 Sorin Mustaca, All rights Reserved. Written For: Sorin Mustaca on Cybersecurity

Check www.mustaca.com for the IT Consulting services I offer.
Visit www.itsecuritynews.info for latest security news in English
Besuchen Sie http://de.itsecuritynews.info für IT Sicherheits News auf Deutsch

About the Author

Sorin Mustaca

Sorin Mustaca, (ISC)2 CSSLP, CompTIA Security+ and Project+, is working since year 2000 in the IT Security industry and worked between 2003-2014 for Avira as Product Manager for the known products used by over 100 million users world-wide. Today he is an independent IT Security Consultant focusing on Cybersecurity, secure software development and security for IoT and Automotive. He is also running his personal blog Sorin Mustaca on Cybersecurity and is the author of the free eBook Improve your security .

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close