- This topic has 2 replies, 3 voices, and was last updated 3 weeks, 5 days ago by
Chase Cole.
-
AuthorPosts
-
-
November 20, 2023 at 12:02 pm #91936
Manny Varela
KeymasterPlease present at least three different emerging vulnerabilities on both mobile and physical devices and what particular countermeasures could users implement to help reduce these vulnerabilities.
-
February 13, 2026 at 11:44 pm #113042
Lenay Nichols
ParticipantI must say I have learned, sometimes the hard way, or what I like to call the “find out on my own way” how real vulnerabilities can be on both my mobile and physical devices, especially as technology continues to grow.When connecting to Wi-Fi, it is always safer to use a VPN, avoid sensitive logins, and make sure websites are actually using HTTPS. These steps can help reduce the vulnerability of an attacker intercepting information if the network is unsecured. A huge and very common vulnerability that many of us have experienced involves malicious apps. I have downloaded a few unsafe apps over my younger years, and maturing meant realizing that I must review permissions and verify the developer before installing anything. I will admit I have been guilty of seeing an app and clicking download without fully reading through the permissions, but I have grown in this area by downloading apps only from trusted app stores and keeping my mobile systems up to date.
A third mobile threat is phishing through text messages or email, also called smishing. I have a friend right now who is dealing with someone hacking into their Instagram profile because they clicked on a suspicious link in their inbox, which shows why we must verify messages before clicking on links. Physical devices also have vulnerabilities. One is unauthorized physical access, such as leaving a laptop unlocked. By using strong passwords, screen locks, and encryption, this risk can be minimized tremendously. Another threat is infected USB devices, which can spread malware when plugged in, so we should avoid unknown USB drives and scan removable media before opening files. Finally, IoT devices like our smart cameras or thermostats often have weak default passwords, and we can protect ourselves by changing default passwords and updating firmware regularly. Overall, many vulnerabilities can be reduced by following basic security practices, staying aware of threats, and keeping devices updated. -
February 16, 2026 at 8:53 pm #113071
Chase Cole
ParticipantAs technology keeps improving, new security risks are constantly showing up for both mobile and physical devices. One emerging vulnerability for mobile devices is smishing, which is phishing through text messages. Hackers send fake messages that look like they are from banks or delivery companies to trick people into clicking harmful links. To reduce this risk, users should avoid clicking unknown links, turn on multi-factor authentication (MFA), and keep their phones updated with the latest software.
Another mobile threat is spyware or stalkerware. These apps can secretly track someone’s location, messages, or calls without them knowing. To protect against this, users should only download apps from official app stores, regularly check app permissions, and install mobile security software if possible.
For physical devices, one vulnerability is juice jacking at public charging stations, where malware can spread through USB connections. Using your own charger or a USB data blocker can help prevent this. Another issue is device theft. If a laptop or phone is stolen, personal information could be exposed. Setting strong passwords, enabling device encryption, and turning on remote wipe features are important countermeasures.
Overall, being cautious and proactive can greatly reduce these risks.
-
-
AuthorPosts
- You must be logged in to reply to this topic.



