• About
  • Advertise
  • Privacy Policy
  • Contact
Android Kenya
  • Home
  • News
  • Apps
  • Gadgets
  • Reviews
  • Deals
  • How To
  • Knowledge Base
No Result
View All Result
  • Home
  • News
  • Apps
  • Gadgets
  • Reviews
  • Deals
  • How To
  • Knowledge Base
No Result
View All Result
Android Kenya
No Result
View All Result
Home Sponsored

The biggest mobile cybersecurity threats still accurate in 2019

Guest Writer by Guest Writer
March 13, 2019
in Sponsored
0
The biggest mobile cybersecurity threats still accurate in 2019
FacebookTwitterWhatsApp

With mobile users accounting for the majority of website visits in the past couple of years, we can’t talk about cybersecurity threats without addressing those targeting smartphones and tablets.

There are more than 230,000 new malware programs detected each day and a great deal of those target mobile devices specifically. This is why more and more people are starting to use VPN to keep their devices safe.

Here is a look at the biggest mobile cybersecurity threats still accurate in 2019:

Data Leaks

When most mobile users want to install an app, they do the following:

  • They find the app on the Play Store,
  • Tap “Install” without reading detailed information and comments, and
  • Give the app all the permissions it asks for.

And the problem lies exactly in this – giving apps all the permissions they ask for. Why would a new camera app request access to the user’s contacts? Most of the free apps on the popular app stores are used by advertisers to mine user data so they can target ads more accurately.

Some of these apps may easily be used by cybercriminals. All the data the app gathers on a user’s phone will end up on a remote server, and someone will use it however they please.

Fortunately, this problem is easy to avoid. Before giving the newly installed app any permissions, users have to be aware of the functionality of the app. It’s important to give apps only the permissions that allow them to work properly, and avoid giving all the permissions they ask for.

READ:  Mobile devices pose a huge risk to any organization's cybersecurity

Wi-Fi Threats

Cybersecurity and Wi-Fi became best friends with the breaking of WPA2 in 2017. After discovering a major weakness in the Wi-Fi security protocol, experts showed the general public how their WiFi networks could be turned against them. And this is only one weakness discovered by the good guys. Imagine the threats hidden in the public and unsecured Wi-Fi networks.

To counter this problem, users should go with the best VPN. VPNs are designed to encrypt end-to-end traffic and render users completely anonymous. With this type of data protection, the best VPN is the only viable user-friendly solution able to protect them even on the public hotspots.

Phishing Attacks

Cybercriminals are getting very smart. Social engineering is one of the most sophisticated tricks of the trade they use to get what they want. This practice was really well established on desktop platforms, but it’s also starting to appear in the mobile landscape.

The security report from 2018 tells us that more than 90% of cyber crimes start with users clicking on a phishing link embedded in the email. In the IBM report, we can see another staggering fact – people are three times more likely to click on a phishing link on their mobile device than on a desktop computer.

With the BYOD (bring your own device) practice becoming more common in the business world, this problem becomes even more severe. To answer this threat, companies have to work closely with their L&D departments and provide employees with education and training accordingly.

READ:  Google's new program recommending Android devices for use by businesses sidesteps Samsung devices

Unattended Devices

Patching and updating are the two most important methods used to combat cybercrime. Manufacturers of devices and software firms discover hundreds of new bugs and open backdoors in their products every day.

They work tirelessly to address these issues, and this is why we can sometimes see two versions of the same mobile app released in one day. Users who fail to keep their devices updated are exposed to a greater amount of risk.

Both iOS and Android platforms have made improvements in terms of notifying the user about the new available system updates. But when it comes to standalone apps, users have to become more proactive. The best way to combat this is to enable automatic updates when the phone is connected to a charger.

READ:  Monthly Android security updates are the most important, but you probably never get them

Stolen Devices

One of the downsides of using mobile devices is that they can easily get lost or stolen. People with ill intent can then gain access to private data on the phones, including contact info, conversation history, images, credit card info, and more.

This threat can be minimized by enabling the additional security lock features on a mobile device – fingerprint, PIN, patterns, and so on.

READ:  What to do when you lose your phone

These mobile cybersecurity threats are still viable in 2019. The solutions are not that hard to pursue, as they range from being more responsible for a mobile device to using the best VPN and being careful about clicking the links embedded in emails.

Join our Telegram channel
Previous Post

Xiaomi’s first Android Go smartphone, Redmi Go, now on sale in Kenya

Next Post

Android Q arrives in beta, doubles down on privacy and adds support for foldable devices

Related Posts

Xiaomi Mi Home store kenya
News

CA report reveals how your Android phone and smart home gadgets are opening doors for cyber attacks

January 16, 2025
CAK-Kenya
News

CA’s Q3 2024 cybersecurity report warns of surge in Android malware threats

January 16, 2025
Safaricom-CEO-Ndegwa
News

Safaricom awarded top certification in privacy information management amid data-sharing allegations

January 16, 2025
Next Post
Android Q arrives in beta, doubles down on privacy and adds support for foldable devices

Android Q arrives in beta, doubles down on privacy and adds support for foldable devices

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

  • Trending
  • Comments
  • Latest
Samsung-Galaxy-A14-5G-top-10-2023

Android had only 3 phones in the global top 10 best-selling smartphones in 2023

February 21, 2024
Google’s new program recommending Android devices for use by businesses sidesteps Samsung devices

The best selling smartphones list for 2022 has only two Android phones

March 9, 2023
Tecno Spark 3 Pro-10

How to fix OTG connected pop-up error on Tecno phones

July 28, 2019
XAI-Grok

Trend of Grok users digitally undressing women on X sparks backlash

May 5, 2025
XAI-Grok

Trend of Grok users digitally undressing women on X sparks backlash

0
Telegram-Android-Kenya

Telegram rolls out encrypted group calls, business automation, and gift upgrades

0
Oppo-A5-Pro-in-Kenya

Here’s the global average selling price of Android phones vs iPhones in Q1 2025

0
Vivo-X200-Pro

Vivo is Android’s revenue champion in Q1 2025, Samsung and Xiaomi hold ground on shipments

0
XAI-Grok

Trend of Grok users digitally undressing women on X sparks backlash

May 5, 2025
Telegram-Android-Kenya

Telegram rolls out encrypted group calls, business automation, and gift upgrades

May 5, 2025
Oppo-A5-Pro-in-Kenya

Here’s the global average selling price of Android phones vs iPhones in Q1 2025

May 5, 2025
Vivo-X200-Pro

Vivo is Android’s revenue champion in Q1 2025, Samsung and Xiaomi hold ground on shipments

May 5, 2025
  • About
  • Advertise
  • Privacy Policy
  • Contact

© 2025 Android Kenya

No Result
View All Result

© 2025 Android Kenya

 

Loading Comments...