BCC-TVB

Voice Bridge tática para utilização em campo, com configuração simples e sem a necessidade de um longo treinamento.

BCC-NANO

Voice Bridge portátil para utilização entre agências que não requer configurações complexas nem longos treinamentos

BCC-NEXT

Um sistema ampliável, com uma base econômica que pode ser ampliada

BCC-TACTICAL

Sistema robusto que combina voz, dados e interoperabilidade de rádio, para uso em situações difíceis.

BCC-MICRO

Um sistema robusto que combina voz, dados e interoperacionalidade de rádio para utilização em ambientes sigilosos.

BCC-EM

Sistemas de comunicação escalonáveis, que podem atuar como um backup do EOC (Centro de operações de emergência) e um centro de comando portátil.

BCC-MIL Series

Solução de comunicações táticas utilizável em operações conjuntas e de coalizão.

Lista de produtos
Mercados
Recursos
Voltar para o blogue

Mobile Mayhem: Why Cisco Calls Smartphones the Achilles’ Heel of Cybersecurity

14 agosto 2024 8 minutos
Secured Communications
Compartilhar:

The use of mobile phones has grown exponentially in the last decade. There are currently 6.92 billion people using smartphones worldwide. That equates to 85.95% of the total population on the planet. Mobile phones have become a primary means of communication due to widespread availability, portability, and the numerous ways they can connect people instantly across various modes.

With such a large portion of the population utilizing mobile devices to communicate, cybercriminals are always on the hunt for weaknesses in smartphone technology. According to industry giant Cisco, mobile devices are one of the most challenging areas and functions to defend. Human error and vulnerabilities inherent in mobile devices make these platforms ripe for the picking by nefarious individuals and criminal organizations.

Understanding why smartphones and other mobile devices are so vulnerable is vital to protecting yourself and your organization from the numerous threats waiting to attack. From physical theft to phishing attacks, smartphones are easy targets. Given their vulnerabilities, mobile devices are especially concerning to those working with secure communications that interact with unsecure smartphones.

If your organization is fortunate to use specialized equipment that bridges this gap, you are at an advantage. Even so, understanding and mitigating smartphone vulnerabilities is vital.

Unsecured Wi-Fi Connections

Wi-Fi networks are everywhere. Some of these networks are secure and require passwords or other security measures to connect to, but many Wi-Fi networks lack encryption and other features that limit access. Many of us are guilty of connecting with networks at stores, restaurants, or other often-traveled establishments. Each time a connection is made to unsecure Wi-Fi networks, smartphones are exposed to numerous threats.

Some of the more common threats include data interception, man-in-the-middle attacks, rogue hotspots, malware distribution, password sniffing, and session hijacking, just to name a few. While smartphone users may think they are getting a fast and free connection to the internet, they are opening themselves up to attack. These attacks can cause enormous damage to individuals and extend to all the devices their smartphone connects with.

The best method for protecting mobile devices from unsecured Wi-Fi is to avoid using these networks. If Wi-Fi networks are not password-protected, look for secure networks instead. While this may cause an inconvenience, it pales in comparison to dealing with a phone that criminals have attacked.

Stick with an encrypted virtual private network (VPN) and protect your data. They may not protect against everything, but they are a good place to start. In situations where radios and smartphones might be used together, often seen in emergency situations, only connect these devices through radio interoperability gateway systems.

Malicious Apps

Smartphones have given rise to the app. There is an app for everything from storing information on our contacts to banking, fitness, passwords, and more. Many people rely on apps every day to function as they see fit. With that in mind, apps have also become lucrative targets for cybercriminals.

When apps are downloaded from locations outside of large-scale sites like the Apple App Store or Google Play Store, they can contain hidden dangers. Often, the umbrella term for this sort of threat is called grayware.

Not all grayware is malicious, but when it is, these apps can steal information such as the device’s number, location, or information associated with the downloaded application. Grayware can continue to harvest information from a smartphone without the user’s knowledge. When devices with grayware are used by individuals such as law enforcement officers or the military personnel, sensitive information, such as location, can have deadly consequences.

To minimize the chance of smartphone apps containing grayware, only download applications from trusted sites. Before apps are installed, make sure to check what permissions, such as location data and access to the device’s camera, the user is granting the app. Never give more access than you or your organization is comfortable with.

Phishing Attacks

Smartphones have evolved far beyond a means of making phone calls on the go. Many people use mobile devices as their primary means for checking email, communicating through social media, and handling all their banking and investment activities. Phishing attacks capitalize on this trend. By tricking the user into thinking they are receiving a text, phone call, or email from a trusted source, they can gain access to our most personal information.

Often, the people most likely to suffer from phishing attacks are vulnerable population groups, such as older people. The best method for avoiding these scams is to think about the message you are receiving and verify the sender’s identity before taking action. Never click on a link if there is any doubt regarding its legitimacy.

Outdated Software

Unless a smartphone is set to install updates automatically, the operating system and software for various applications can quickly become outdated. For everyone trying to keep mobile devices safe, numerous people on the other side are trying to exploit weaknesses. What may have been secure when you last downloaded it, may now be an easy target for criminals.

Government agencies are notorious for failing to update software. This vulnerability can expose sensitive information that impacts national security. What seems like a simple IT housekeeping oversight can significantly impact a nation. Ensuring your organization has a plan in place to keep all software on smartphones up to date is vital.

Physical Theft

While it is often overlooked, the physical nature of smartphones, mainly how small they are, makes them vulnerable to theft. While we like to think our phones are invulnerable, for anyone with the right equipment, lock screens and passwords do little to protect smartphones.

Maintaining physical control of your device is crucial to avoiding theft. As technology improves, features like facial recognition or other biometrics are preferred to simple codes or passwords. Never leave your phone unattended. If you are going to place your phone someplace away from you, ensure it is locked away where physically grabbing the device is more challenging for thieves.

Bluetooth Vulnerabilities

Bluetooth technology provides people with many conveniences. The days of untangling cords for speakers, earphones, or other devices are long gone. Smartphones utilize Bluetooth to connect to earbuds, hearing aids, speakers, computers, and more.

While Bluetooth has a short range, criminals are still more than happy to exploit holes in the technology. Using Bluetooth, a hacker can send the smartphone user unsolicited text messages and files. It is even possible to hijack the phone and take control of the smartphone’s functions. Doing this is also known as “Bluebugging.”

To avoid these issues, ensure your Bluetooth function is turned off while not in use. Additionally, refrain from allowing your device to be discovered on networks. When asked, always set your device to “non-discoverable.” These simple steps can significantly diminish your device’s vulnerability to this threat.

Many people agree that mobile devices have greatly improved our lives. With most of the world’s population having these devices, we are able to connect like never before. While this technology has numerous benefits, it is not without its perils.

Smartphones are easy to steal and, through human error and malicious practices, are ripe for the picking by cybercriminals and other nefarious groups. Use the technology granted from mobile devices to your benefit, but don’t ignore the vulnerabilities of the platform. Use smart practices, like those listed above, to stay one step ahead of the criminals.

Liked this blog post? Stay tuned by subscribing to our blog!

Últimas notícias

Ver todas as postagens