Every malicious attack method used to attack PCs is now being rewritten to hack mobile devices. How are the hackers getting to your mobile phone?
Here are five common ways hackers are accessing your mobile data:
Once used primarily to gain access to a PC without the owner’s consent, malware is making its way onto mobile devices. As on a PC, you can be duped into downloading the malware to your mobile device as it’s often disguised as the newest game or productivity app and even offered by people impersonating technical support agents.
From most PC’s points of view, mobile devices are viewed as just another storage device, like a flash drive. So when you synchronize your phone with your PC, some types of malware can jump to (or potentially from) your mobile device.
When a program tries to store more data in a buffer (temporary storage area) than it was intended to hold, it overwrites adjacent memory. This is caused by a programming error, but a side effect of the error can lead to a common type of security attack. These buffer overflows affect data integrity and/or can lead to privilege escalation or remote code execution attacks on PCs. We’re beginning to see buffer overflows on mobile devices, too.
These types of attacks, aimed at making computer resources unavailable to their intended users, once focused solely on PCs. They’re now occurring in the mobility space.
Morphed for mobility, Phishing now includes SMiShing and it can be carried out via text message. SMiShing uses cell phone text messages to bait you into divulging personal information. For example, you might receive a text message requesting that you call an unfamiliar phone number, or that you go to a URL to enter information, or a message that prompts you to download software to your phone.
Morphed for mobility, Phishing now includes SMiShing and it can be carried out via text message.
This is important: If you access the URL in the SMiShing text message or download any software to your device (PC or mobile device), you may unintentionally install malware on the device. If you receive a text message that asks you to call a number you don’t recognize or go to a web site to enter personal information, do NOT select the link embedded in the message. Just delete the text message.
Learn how AT&T Tech Support 360SM staffed by cybersecurity experts, can help you save time, money and perhaps your data.
Share this with others
READ MORE ARTICLES ON:
Your feedback will help us to improve AT&T Business so you continue to have a great experience when visiting us!
This survey is conducted by an independent company ForeSee for AT&T.
Yes, I’ll give feedback!
Sign up for the AT&T Business newsletter
Please provide the following information to access your document:
* To access your content, please check your browser settings to make sure pop-up windows are allowed.