Hacks & Attacks: The Evolution of Mobile Security

After opening the box of your brand new computer, the first task you complete is install an anti-virus software to protect your precious investment. With new vulnerabilities enabled on the web daily, it is crucial to keep your web environment safe and sound. This is why if you walk into any technology store, you will find many anti-virus or malware scanning software brands. This trend has expanded into the mobile world. Investing in the security of mobile devices has become very popular due to the new found dependence of cell phones and tablets. With the average American working remotely now more than ever, it is imperative to protect mobile hardware as well as laptops and desktops. It has been reported that hacking into an unsuspected victim’s phone is quite simple for skilled hackers. Once the phone has been infiltrated, hackers can access private data such as photos, text messages, emails, even the camera! Scary right?

Apple Security

After the iCloud hacking scandal that affected so many people, Apple has made some progressive moves in trying to protect their customers from future threats. Apple’s latest operating system iOS 9, which is currently available, includes a few updates to the system’s security features. The updated security features include:

  • A six-digit passcode opposed to four is now required to unlock the device (Power, 2015)
  • Users are now required to input a six-digit verification code (sent to a trusted device) along with their email address and password when signing in from a new browser or device for iTunes and iCloud (Power, 2015)
  • The VPN extension support has been increased, now allowing the implementation of the client side of a custom VPN tunneling protocol (Power, 2015)

Double Threat Against Vulnerablities

As for most anti-virus solutions for mobile devices are activated via a mobile app, a company named VYSK created a mobile phone case to protect your device from malware. VYSK implements encryption technology for text messages and emails so if your private data ended up in the wrong hands, hackers cannot interpret the message (Davis, 2015). This can give any business professional peace of mind while constructing business deals on the go by protecting every aspect of the cell phone, inside and out.

Check it Out!

From the same makers of Norton Shopping Guarantee (an online solution which displays online sites are secured), Norton developed a software to keep mobile devices secured.

Risky Business

Jailbreaking is a looked down upon trend due to the vulnerabilities devices can be exposed to. Many people jailbreak their device in order to change the manufacturer settings to customize the device or download apps that are not available within the Apple App Store. If you choose to jailbreak your device, be careful of what you download. One malicious download can ruin your mobile device forever.


To avoid potential risks, it is best to always visit sites that are encrypted and secured with an SSL Certificate. You can check to see if the site has an active SSL Certificate by looking within the browser bar of the site (where the URL is entered).

Check it Out!

If the brower is highlighted in green (like the image below), the site you are on is secured with an EV SSL Certificate. You can view the validity of the SSL Certifcate by clicking on the padlock within the browser.



Davis, Amy. "Texas Company Creates 'hack-proof' Cellphone Cases." Click 2 Houston, 15 Aug. 2015. Web. 29 Sept. 2015.

Power, John-Paul. "Top Tips to Secure Your New IPhone." Symantec Security Response. Symantec, 10 Sept. 2015. Web. 03 Oct. 2015.

#Mobile-Malware-Protection  #Mobile-Hacks  #Hack-Proof  #Cellphone-Cases
#iPhone  #iPad  #Apple
#Android  #Dont-Be-a-Victim