hpasekovat July 22,2015 Aren’t applications downloaded from the Apple store protected against malicious apps like this? I know that, by downloading some free apps, you agree to your location be constantly tracked. But downloading something as malicious as this from the Apple store would be surprising.
mrgodfrey3at July 23,2015 Interesting video - although its actually a sales pitch for Tren Micro. The events depicted are accurate. The advise provided should be followed. Android is a very risky mobile device to trust - especially if the user is installing applications for 3rd party sources.
Beggsseat September 10,2015 This is an eye opening video depicting the speed that information travels around the globe via smartphone. The ease and speed that a phone can be compromised is a bit startling. Something to think about as it suggests this is the evolution of tools for corporate espionage and insider trading. Never thought to consider the role of compromised phones.
hhoang5at September 17,2015 This video shows just how vulnerable smartphones can be to cyberattacks, and since people takes their phones with them almost everywhere, the potential for espionage and financial damage can be very serious. However, a lot of mobile phone attacks can be prevented by the user being vigilant about what they put on their phones; many just install apps without reading the permissions carefully. A lot of attacks on smartphones recently are caused by users installing apps via unofficial channels (such as jailbreaking). Google and Apple have app reviews process that can help hinder the potential security exploits but cannot fully prevent them.
aholcom2at September 20,2015 This was a pretty good video concerning mobile security. Although the video covered the main way a smart phone (Android phone) can get malware via malicious apps. It would interesting to see an updated video explaining about native vulnerabilities in the smart phone OS. One of the biggest ones was the Stage Fright vulnerability that affected nearly 1 billion Android phones. Unfortunately the only way to patch the vulnerability was to download a system update. However, due to carriers controlling the phone updates it takes a long time for users to update their phones.