Cybersecurity Certifications | Mile2

Viewing 2 reply threads
  • Author
    Posts
    • #91936
      Manny Varela
      Keymaster

      Please present at least three different emerging vulnerabilities on both mobile and physical devices and what particular countermeasures could users implement to help reduce these vulnerabilities.

    • #113042
      Lenay Nichols
      Participant

      I must say I have learned, sometimes the hard way, or what I like to call the “find out on my own way” how real vulnerabilities can be on both my mobile and physical devices, especially as technology continues to grow.When connecting to Wi-Fi, it is always safer to use a VPN, avoid sensitive logins, and make sure websites are actually using HTTPS. These steps can help reduce the vulnerability of an attacker intercepting information if the network is unsecured. A huge and very common vulnerability that many of us have experienced involves malicious apps. I have downloaded a few unsafe apps over my younger years, and maturing meant realizing that I must review permissions and verify the developer before installing anything. I will admit I have been guilty of seeing an app and clicking download without fully reading through the permissions, but I have grown in this area by downloading apps only from trusted app stores and keeping my mobile systems up to date.
      A third mobile threat is phishing through text messages or email, also called smishing. I have a friend right now who is dealing with someone hacking into their Instagram profile because they clicked on a suspicious link in their inbox, which shows why we must verify messages before clicking on links. Physical devices also have vulnerabilities. One is unauthorized physical access, such as leaving a laptop unlocked. By using strong passwords, screen locks, and encryption, this risk can be minimized tremendously. Another threat is infected USB devices, which can spread malware when plugged in, so we should avoid unknown USB drives and scan removable media before opening files. Finally, IoT devices like our smart cameras or thermostats often have weak default passwords, and we can protect ourselves by changing default passwords and updating firmware regularly. Overall, many vulnerabilities can be reduced by following basic security practices, staying aware of threats, and keeping devices updated.

    • #113071
      Chase Cole
      Participant

      As technology keeps improving, new security risks are constantly showing up for both mobile and physical devices. One emerging vulnerability for mobile devices is smishing, which is phishing through text messages. Hackers send fake messages that look like they are from banks or delivery companies to trick people into clicking harmful links. To reduce this risk, users should avoid clicking unknown links, turn on multi-factor authentication (MFA), and keep their phones updated with the latest software.

      Another mobile threat is spyware or stalkerware. These apps can secretly track someone’s location, messages, or calls without them knowing. To protect against this, users should only download apps from official app stores, regularly check app permissions, and install mobile security software if possible.

      For physical devices, one vulnerability is juice jacking at public charging stations, where malware can spread through USB connections. Using your own charger or a USB data blocker can help prevent this. Another issue is device theft. If a laptop or phone is stolen, personal information could be exposed. Setting strong passwords, enabling device encryption, and turning on remote wipe features are important countermeasures.

      Overall, being cautious and proactive can greatly reduce these risks.

Viewing 2 reply threads
  • You must be logged in to reply to this topic.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Cybersecurity Certifications for Today's INFOSEC Careers

Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.

 

Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range.  We train students in penetration testing,disaster recovery, incident handling, and network forensics.  Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.  

 

Accreditations

We've developed training for...

Canada Army Navy Airforce

The Canadian Department of National Defense

USAF

The United States Air Force

Defense Logistics Agency

A United States Counterintelligence Agency

Texas Workforce Commission

Texas Workforce Commission

Privacy Overview
Cybersecurity Certifications | Mile2

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.