4

Tech guru says PM's mobile advice not enough for peace of mind

 1 year ago
source link: https://itwire.com/business-it-news/security/tech-guru-says-pm-s-mobile-advice-not-enough-for-peace-of-mind.html
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

Monday, 26 June 2023 10:00

Tech guru says PM's mobile advice not enough for peace of mind Featured

By Sam Varghese
Tech guru says PM's mobile advice not enough for peace of mind

Image by Stefan Coders from Pixabay

A well-known tech personality says the advice from Prime Minister Anthony Albanese, to switch off mobiles once a day, may not be all that needs to be done to improve one's chances of avoiding security issues on devices.

Albanese was quoted in some Australian media as saying, "We all have a responsibility. Simple things, turn your phone off every night for five minutes. For people watching this, do that every 24 hours, do it while you’re brushing your teeth or whatever you’re doing."

In a blog post on Friday, Paul Ducklin, a long-time systems administrator who works with global security firm Sophos, said he was unsure why the PM had said five minutes. "Why at night? Why every day? Why for five minutes, and not, say, two minutes or 10 minutes?" he asked.

Rebooting a mobile phone would do some good in the case of non-persistent threats and no harm, he noted.

But, Ducklin said, "The problem is that most malware these days, especially secretive mobile spyware developed at the likely cost of millions of dollars, will be of the persistent threat sort, meaning that it won’t exist only in memory until the end of your current session and then evaporate like early-morning summer mist."

As an example, he pointed to the latest fixes issued by Apple for two zero-days, one in WebKit and one in the kernel.

"If attackers can only trigger the execution of unauthorised code inside your browser, then it’s likely that their malware won’t be able to escape from the browser process and therefore won’t be able to access or modify any other parts of the device," Ducklin said.

"The malware might therefore be limited to the current browser session, so that rebooting your phone (which would bump the browser software and its injected malware code out of memory) would indeed magically disinfect the device.

"But if the unauthorised code that the attackers run inside your browser via the zero-day WebKit bug follows up by triggering the other zero-day bug in the kernel, you are in a pickle."

He suggested the following additional steps to improve mobile security:

  • Uninstall apps that are not needed and delete all the associated data.
  • Log out from apps when they are not in use as the best way to avoid exposing data by mistake was to authorise oneself, and therefore one's device, to access it only when genuinely necessary.
  • Study how to manage privacy settings of all apps and services used.
  • Find out how to clear browser history and do so frequently.
  • Keep app access to the lock screen to the minimum.
  • Make the lock code as long as possible and lock time as short as could be tolerated.
  • Sharing should be done only if one knew what was being shared.
  • SIM cards should have a PIN code.

"A physical SIM card is the cryptographic key to your phone calls, text messages and perhaps some of your 2FA security codes or account resets," Ducklin pointed out.

"Don’t make it easy for a crook who steals your phone to take over the 'phone' part of your digital life simply by swapping your unlocked SIM card into a phone of their own. You only need to re-enter your SIM PIN when you reboot your phone, not before every call."

Read 461 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here


Lead-Machine_pink_600x260.jpg

GARTNER MARKET GUIDE FOR NDR 2022

You probably know that we are big believers in Network Detection and Response (NDR).

Did you realise that Gartner also recommends that security teams prioritise NDR solutions to enhance their detection and response?

Picking the right NDR for your team and process can sometimes be the biggest challenge.

If you want to try out a Network Detection and Response tool, why not start with the best?

Vectra Network Detection and Response is the industry's most advanced AI-driven attack defence for identifying and stopping malicious tactics in your network without noise or the need for decryption.


Download the 2022 Gartner Market Guide for Network Detection and Response (NDR) for recommendations on how Network Detection and Response solutions can expand deeper into existing on-premises networks, and new cloud environments.

DOWNLOAD NOW!

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK