Please Note:
The support ticket system is for technical questions and post-sale issues.
Â
If you have pre-sale questions please use our chat feature or email information@mile2.com .
Discuss some of the potential risks associated with mobile devices for 2022 and how they can potentially affect mobile device users.
I would say that some of the risks associated with mobile devices would include the users themselves, and face lock technology. There are so many SPAM callers today that it is possible to gain personal information through deception. My grandparent got a SPAM call from someone claiming to work at a hospital claiming that I was in a horrific car accident, and they needed personal information from my grandparents. I was fine and it was just some attempt to get my grandparents personal information. The face lock technology could be problematic in that someone could gain access to your phone if they had a picture of you. Connecting to public wifi networks could also be risky. You never know whether or not someone with malicious intent is monitoring the network.
-Jacob Mannon
Speaking of that my dad recently got a spam caller and fell for it because of that he now has to redo his and my sisters entire account data luckily mine was untouched. I did notice that the word Huntington was all caps ex HUNTINGTON And personally if I got a call like that because of my experience with spam callers I wouldn’t have answered the call.
Hello Jacob,
You did a great job explaining some of the risks and vulnerabilities that mobile device users faced in 2022. I also think being able to recognize these malicious attacks either through spam or malware is something people need to be educated on nowadays because social engineering is becoming more and more of a problem for older people such as grandparents who might not understand that it’s a scammer.
Hello Jacob,
You are absolutely right in regards to how common scamming has become. I have also heard of people getting similar calls attempting to obtain a persons information. I also think that face recognition is not a reliable source of security. I personally have been hacked using facial recognition. I think it is a nice feature but I would not use it to safe guard any sensitive information.
In 2022, mobile device users faced significant risks, including phishing attacks, malware, ransomware, insider threats, weak passwords, and unpatched software, all of which could lead to data loss, unauthorized access, and financial demands. Additionally, DDoS attacks, social engineering tactics, IoT vulnerabilities, and cloud security risks further endangered users. To mitigate these threats, users should implement strong passwords, enable multi-factor authentication, keep software updated, and use antivirus solutions. Regular training on recognizing phishing attempts and securing IoT devices is crucial. Using VPNs on public Wi-Fi and encrypting sensitive data can also help protect against network threats. By adopting these measures, mobile device users can significantly reduce their exposure to potential security threats.
During 2022 mobile devices faced a lot of potential risks like the phishing again because the phishing came from emails and people opening them on their mobile devices. Another is the data leakage as it is leaking your data onto the internet which is a huge risk mobile device users can take. The unsecured Wi-Fi connections I would say is another huge one because it can and will allow hackers to have access to your personal information and they will steal it. This all-effects mobile device users because it simply exposes all your personal information, and this can lead to financial losses.
Amy,
Phishing emails have been an ongoing issue for years. I think the best way for us to mitigate this is to be mindful of how we interact with our email. I was almost phished a few times when I was looking for a new job on indeed. I was sending so many applications out that I didn’t properly check who was responding. I was getting emails about jobs that I had never even applied for. It was a good learning experience though and I learned a lot about phishing and spam emails.
-Jacob.
In 2022, mobile devices pose several risks to users, primarily related to security, privacy, and mental health. Mobile devices are vulnerable to malware, phishing attacks, and data breaches. Malicious apps, insecure Wi-Fi networks, and unpatched software can compromise sensitive information, such as banking details and personal data. Many apps track user behavior, often without explicit consent, leading to potential data misuse. Geolocation tracking, excessive permissions, and the collection of personal data can infringe on privacy rights. Excessive screen time and constant notifications can contribute to anxiety, depression, and poor sleep. Social media apps, in particular, are linked to negative body image issues and the fear of missing out (FOMO). The addictive nature of mobile apps, especially games and social media, can lead to a decrease in real-life interactions and hinder productivity. Mitigating these risks requires user awareness, secure practices, and mindful device usage.
In 2022, both android and iOS faced cyber-attacks in a multitude of ways. Hackers used Malware and ransomware, mobile app vulnerabilities and QR code scans to hack into customer phones yet, many other methods were used while gaining access to user devices. Mobile banking Trojans were used to gain access to users, login credentials allowing hackers to access customer sensitive information like financial information. This Trojan was used in a phishing tactic where users clicked on an insecure link. An example of this is where Flagstar Bank, which had 1.5 million customers (about the population of West Virginia) have their Social Security numbers and financial information breached.
QR codes gained popularity in 2020 due to their convenience unfortunately QR codes have also become a more simplistic unidentifiable way for hackers to get access to customer information. At times Hackers will use posters or advertising with The QR codes from there when the customer attempts to engage with the QR code the hackers are able to then gain access to the customers information and data. This can be mitigated by only using trusted QR codes. Another way to mitigate the issue with QR codes would be to ensure to check the URL prior to going to the link once capturing the QR code. Using some of the hacking methods listed above, hackers can take control of your device while being remote. It is important to be aware of your updates on your phone and if you are experiencing any slow running or malfunctioning apps it is important to ensure that your phone has not been hacked by any type of malware or virus.
.
The support ticket system is for technical questions and post-sale issues.
Â
If you have pre-sale questions please use our chat feature or email information@mile2.com .