7 mobile security threats you should take seriously in 2019

Discussion in 'mobile device security' started by ronjor, Feb 21, 2019.

  1. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    163,943
    Location:
    Texas
  2. Amy Pattillo

    Amy Pattillo Registered Member

    Joined:
    Mar 3, 2019
    Posts:
    1
    Location:
    US
    Great article. It is eye-opening to realize the number of different mobile security threats that have developed. The data leakage portion of the article highlights the importance of looking at the types of software that are added to employee mobile phones.
     
  3. Traci Esteve

    Traci Esteve Registered Member

    Joined:
    Mar 5, 2019
    Posts:
    1
    Location:
    Portland oregon
    Thank you for the summary. An example for social engineering: while using a popular business contact application, a user poses as a recruiter and asks to contact you privately over email. By looking at the "recruiters" work history and number of contacts, you can ascertain if they are real or if this is a phishing attack. Unfortunately in cases where people are looking for jobs, they might not thoroughly review the background of the requester.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.