RSS

Tag Archives: Mobile Security

Often Asked Questions: Are There Cyber-Security Dangers With Apps And What’s About Privacy?

Often Asked Questions: Are There Cyber-Security Dangers With Apps And What’s About Privacy?

.

Wordle-Logo-Apps

.


WHAT Are Apps?

[START Text from Wikipedia] A mobile app, short for mobile application, or just app, is application software designed to run on smartphonestablet computers and other mobile devices. The term “app” is a shortening of the term “application software“. It has become very popular and in 2010 was listed as “Word of the Year” by the American Dialect Society.[2] In 2009, technology columnist David Pogue said that newer smartphones could be nicknamed “app phones” to distinguish them from earlier less-sophisticated smartphones.[3] [END Text from Wikipedia]

.

Apps-usage-2013-infographic

Infographic credit ===> http://fluency21.com/blog/2013/04/21/all-about-apps-infographic/ <===

.

As already mentioned above: “Apps are designed to run on smartphones, etc.” means that they were created, actually programmed by humans and any code has bugs!

First WE need to know that WE are working with programmed code created by humans, and as ===> Nobody Is Perfect <=== so aren’t these programs. WE must also admit that NOT any programmer has the necessary knowledge about to create code for BEST Cyber-Security, NOR isn’t it possible to create 100% secure code, there is always a certain percentage of bugs in the code, thus meaning: there will be vulnerabilities in these programs!

I invite YOU to read the article(s) below for a deeper insight:

.


Creating Apps In Schools For Kids And Parents: WHAT Should WE Be Aware About!?

programmerman-animated

.

Apps are NOT ===> TOYS <===! There are STRICT rules to be followed as mentioned from the ===> U.S. Small Business Administration <===:

12. If you’re dealing with financial data, health data, or kids’ data, make sure you understand applicable standards and regulations

If your app deals with kids’ data, health data, or financial data, ensure you’re complying with relevant rules and regulations, which are more complex. The FTC offers details on the regulations that your business needs to be aware of in the following guides:

.

Find out the complete guidelines here, please:

.

.


Apps And Cyber-Security

Apart from programming errors, there are ALSO the bad boys (Cyber-Criminals) who are creating (programming) Apps to take the control over YOUR devices to earn money with them!

.

easy to hack Apps

Click the image to access the article who explains well in detail.

[START Text from TrendLabsSM 2013 Annual Security Roundup] On the mobile security front, we witnessed the mobile malware and high-risk app volume surpass the 1-million mark as early as September 2013.2. The current volume has, in fact, reached roughly 1.4 million, with 1 million new malicious and high-risk apps found in 2013 alone. [END Text from TrendLabsSM 2013 Annual Security Roundup]

.

Malicious and High-Risk Mobile App Growth, 2013

Image credit ===> http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt-cashing-in-on-digital-information.pdf <===

.

Please find the full report of TrendLabsSM 2013 Annual Security Roundup here:

.

state_of_security_2014_11-Apps-hacked

 Click the above image to access the article, please.

.

Apps vulnerabilities

 Click the above image to access the article, please.

.

Click the above video to learn more.

.

Check out ALSO (A MUST to understand) the video below, please, who explains BEST:

.

And ALSO the McAfee LAbs Threats Report Fourth Quarter 2013

.

TOTAL MOBILE MALWARE 2013

TOTAL MOBILE MALWARE 2013

.

.


Good To Know: Who Is Hosting Most Of Malware And Spam?

I am getting asked very often who are the countries who host most of Malware and Spam, check below to find out, please.

.

Location Of Servers Hosting Suspect Content 2013

Location Of Servers Hosting Suspect Content 2013

.

TOP Countries Hosting Phishing And Spam URLs 2013

TOP Countries Hosting Phishing And Spam URLs 2013

.


Third Party App Stores, Avoid Them!

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01

.

The main distribution method of malware Apps is still shady apps downloaded via third-party app stores, say the Security experts! Thus meaning: download Apps ONLY from their ORIGIN website, please check below:

.


Smartphones Are Mini Computers With Phone Capability

Chat icon.

.

DON’T forget that Smartphones are Mini-Computers with phone capability and so YOU MUST treat them ALSO! Thus meaning: the same AWARENESS and PROTECTION is necessary as for computers ===> ANY OS & ANY DEVICE <===!

.

.

When Good Technology Goes Bad: Evolution of Mobile Technology

March 2014

Mobile hardware is evolving at an unbelievable rate. Think about it: the cell phone you are using right now has more computing power than the computers that sent Neil Armstrong into space a few decades ago. And not only has mobile technology been advancing so impressively, but the costs associated with the technology have been decreasing, making it more widely available and adopted.

Read more:

.


How To Protect OUR Smartphones?

programmerman2SO, now WE know about the online dangers, BUT How-To protect OUR Smartphones and tablets? Well, there are a lot of professional Security companies who offer protection tools, even as FREEWARE, check links below, please:

.

.


And WHAT About Privacy!?

sharing-iconTalking about Privacy? YES, in some countries Privacy isn’t really (not yet) a matter, BUT in EUROPE WE fight for OUR human right about PRIVACY! When WE work together with children WE need to take care about the DATA which is used from the kids in EDUCATION and ALSO, especially, the private data who is shared through the different APPS! MOST of people don’t even know about the word “Permissions” when THEY install APPS on their devices, and that is very BAD!

People expose so THEIR complete ONLINE LIFE (which is ALSO their private life in Real-World…) on the internet! This is THEIR “Digital Footprint” who is used by commercials to address them tailored advertising and ALSO, the MOST important, it is THEIR resume for future employers! OUR “Digital Footprint” will replace the resume in the future (even NOW already…) where employers find out what WE deed over years and SO can make a profile over their future (OR NOT) employees!

.

“When you look at most of the mobile apps, you accept the application and its privileges settings, and there is very little ability for you to customise those settings, so you either agree or disagree.

“App developers are trying to monetise their apps, because remember, most of these are being sold for $1.99 or they’re free, so the only way that they are going to make money is collecting and harvesting data, and selling it to a data house, who in turn is going to sell it to advertisers.

.

Read more:

.

.

.

Apps Security and Privacy

Infographic credit ===> http://go.pronq.com/fortifymobile <===

.

Read more below, please, a MUST for understanding:

.


Are There Existing Tools To Let Me Know Which Apps I Should Be Cautious?

YES, there are FREE online tools where YOU get instant transparency while you’re using Apps on the Web or Facebook, such as App Advisor, who helps safe-guard your personal data by telling you exactly which apps you should be cautious of, before they become a threat to your privacy.

.

Farmville and Privacy

Click this link ===> App Advisor <===

.


Sounds like a lot of RESPONSIBILITY, isn’t it?

sharing-icon

.

The word RESPONSIBILITY, oh YES, do YOU still know what it means? Internet shows us all again that WE are ALL responsible about OUR actions, interactions with other people, same actually as in the REAL-WORLD 😉

.


Think For More…

DON’T forget about tools (Apps) ===> THEY are ONLY as good as the person who uses them and knows ALSO which tool to use for a specific task! <===

Deep-THINKing: DON’T use a screwdriver to hit nails 😉 Thus meaning: YOUR Professional Development needs to be Up-To-Date to know which tool to use and when to use it for a quality course!

.


Some Critical Thinking: Do I really need an app to do that?

Chat icon

.

There are tons of different Apps around and the average user has installed at least hundred (100) Apps on its device(s)!? Aren’t users dependent (addicted) already on Apps and on using THEIR Smartphones!? Was “Albert EINSTEIN” right!? Do WE really need ALL those installed Apps? Can WE still live without the internet and the Apps!? Imagine ONLY one day without YOUR Smartphone, how would YOU feel!?

.

.

Albert-EINSTEIN-Technology-Idiots

Image found on Twitter and edited to hide visages…

..


THE MUST HAVE Apps

Here below my non-exhaustive list of MUST-HAVE Apps:

.

And as WE know that the NSA is spying around (Cyberespionage) it would be a good idea to look for companies located in Europe instead in the USA for stocking OUR DATA! Check below for possibilities:

.

.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


.

Keywords as a reminder for me to create this blog post: Privacy, Mobile-Security, Cyber-Security, Nobody-Is-Perfect, Bugs, Malware, Threat Report 2013, Mobile-Malware on the rise, FREE protection software and Apps, Privacy settings and awareness, Digital Citizen, Mobile Botnet, Curation links, Infographics, stress, too many Apps, do I really need an app to do that? Right use of tools, Third Party App Stores,

.

Stay tuned for next blog post(s) 😉

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Cyber-Security Practice: Learn it in one week

Cyber-Security Practice: Learn it in one week

.

Learning IT-Security

.

Read, think, learn and share over Social Media… Security is everyone’s responsibility! We are ALL responsible for the Internet’s future!


PageRank Checking Icon

.


.

sid2014-anim-banner

.

===> “Nothing in life is to be feared. It is only to be understood.” Marie Curie <===


KEYWORDS FOR THIS FREE COURSE and what you will learn:

“Knowledge is a treasure, but practice is the key to it.”

.

Basics of Cyber-Security Practice, Proactive Thinking, Cyber-Hygiene, hygiene, Awareness, motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of Education, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management (MDM), Mobile Application Management (MAM), risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics, UK govt encourages insurers to reward good IT security…

  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

===> “Nothing in life is to be feared. It is only to be understood.” – Marie Curie – <===

.

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

. .


Learn in one week how to get Best protection/Introduction

.

vdujwtjyx3uq-252anv-p2pnicubuculei01In previous blogs I have presented already the different security programs who help us to stay secure on Internet and not to infect others in the community because our computer is infected! The text below is just a reminder:

In the real world our car needs some maintenance and technical control to make sure that there is no danger to other participants in traffic (pedestrians and drivers…), so the same in the virtual world. Our computer is the “virtual car” who is driving on the “Data Highway” (Internet), it needs maintenance and especially care about IT-Security and safety

I will prepare seven (7) different blogs, one for each day of the week so you don’t need a lot of time to spend for installing the programs and to get used to them… These blogs will refer anyway to the already published blogs and/or would be a simple copy with practical advice and you can use them how you would like. One per day or if you have the necessary time, even more, up to you…

.


Learn in one week how to get Best protection-The Practice

.

programmerman-animatedI will divide the tasks through a whole week, so it will be very easy for you to find the necessary time to achieve them, those who have the necessary time can, of course, achieve more tasks…

.

.

Day of the Week Web Address of Blog  Task  Necessary time
Monday Installing WOT + McAfee SiteAdvisor for knowing which websites are trustful and which ones are malicious!
“WOT” ALONE isn’t enough! My experience over years 😉
Windows + Mac5 minutes per program ONLY!
Tuesday Check if your browsers and its plugins are updated! Why should I?

Windows + Mac

5 minutes per browser ONLY!

Wednesday

 

Use BitDefender QuickScan and scan your computer! Find out if your computer is clean. It only takes a few seconds.Install Secunia Personal Software Inspector, which is checking and automating updates of Third Party Programs.

Windows

Few minutes ONLY for both programs!

Thursday Install Security Score which helps you to know if you made ALL the necessary updates…

Windows

5 minutes ONLY!

Friday Check any Friday if you got the latest updates! 10-15 minutes ONLY!
Saturday It’s Disk Encryption time: you need to install this software only once, so it’s ONLY a one time action!

Install an Encryption Software, I suggest the OpenSource Tool

 

Windows + Mac + LinuxSeveral hours…

Sunday: Use the Sunday for a relax check if everything is OK! It takes ONLY 5 minutes. Use the “Security Score” Software to check if everything is OK! 5 minutes ONLY!

.

As you can see in the table “Necessary Time”, most actions need ONLY 5-10 minutes! Eaaaaaaaasy to follow and to use, what are you waiting for!? 😉

.

For those who have the necessary time: I suggest to you to install first the FREE program “Security Score” (for WINDOWS ONLY) and start to check after your Tuesday-Task and after any days task to see the evolution of your security score! This will probably make you more confident and you certainly will try to reach a better “Security Score”, this for your motivation… Try it out:

.

Encryption-SecurityScore-before-after

.


Protect your Smartphone and be aware of malicious QR-Codes

qrcodes-intro-2

[Start Text from http://www.theregister.co.uk/2012/12/10/qr_code_sticker_scam/Cybercrooks are putting up stickers featuring URLs embedded in Quick Response codes (QR codes) as a trick designed to drive traffic to dodgy sites. [End Text from http://www.theregister.co.uk/2012/12/10/qr_code_sticker_scam/]

As it is impossible to see ONLY by viewing the QR-Code to detect if it redirects to an infected website, it is a MUST to install a QR-Reader who controls before sending you to the website! I recommend:


Concerning tablets

tablet-girl-170.

.

The guys from SOPHOS have created a very good post on their blog “Naked Security” which you should read here:

.

.


What YOU should know about Mobile-Security

.

.

Find protection for your Smartphone(s):

.


Be ALSO aware of your Online behavior

Check also the video below and be surprised…

.

This video reveals the magic behind the magic, making people aware of the fact that their entire life can be found online.

.

.


Learning By Doing Through A Game

I invite YOU ALSO to play the game below, YOU will learn the basics of Cyber Security by ===>LEARNing By Doing <===, enjoy it 😉

.

VOVALABS CyberSecurity Game

Click the image, please, to access the game.

.

Check also the link below, please, where YOU find the details:

.

WHAT YOU MUST KNOW!

1ibdy1vf6wghd-n05dgl-trafficlightgreendan01 .

    • We are ALL responsible for a secure Internet!
    • Automatic Windows Update must be enabled
    • For Apple devices: ALL the updates must be installed also!
    • Third Party Programs are responsible for 78% of vulnerabilities!!! What are Third Party Applications (Programs)? Knowing that third party programs also are vulnerable, we must also update them! Use SECUNIA PSI to update automatically third party programs https://secunia.com/
    • Browsers (ALL) need to get updated! This is also a MUST for Apple devices!
  • While using “BYOD” (Bring Your Own Device), we ALL (Teachers, Educators and Learners) are responsible, not the IT-Admin alone!
  • While using “BYOD” we need a strong “BYOD-Policy” at least!
  • While using “BYOD” it is recommended to have also a “MDM” (Mobile Device Management)!
  • We learned that there is a need for “Mobile Device Management (MDM)” and “Mobile Application Management (MAM)”
  • It is recommended to organize a “Teacher-Parents-Meeting” to explain the parents that their kids are safe in your school, explaining them the efforts you make and asking them also to help their kids to respect the “BYOD-Policy”!
  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

===> I created a new Hashtag#FSCD which means “Friday Security Check Day” + will remind YOU any Friday 2 check your devices 4 updates <===

.

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


.

. Stay tuned for next free courses and tutorials 😉 .


Site Meter

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,