Mobile devices can be both the instruments and victims of privacy violations. Google’s latest innovation, Google Glass, has been pre-emptively banned at a diner in Seattle due to the security implications of an unobtrusive mobile device capable of discreetly recording audio, video and still footage in public and private places. However, most security threats from mobile devices result from the manner in which the consumer uses the technology:
Consumers who elect to set PINs and passwords for their mobile devices often choose easily deciphered codes, such as 1234 or 0000.
Users may unknowingly download malware disguised as a useful application.
Out-of-date operating systems may pose threats. OS manufacturers periodically release security patches and fixes, but it is up to the consumer to update their devices. Older devices may not support new updates to the OS.
Out-of-date software presents similar security risks. Attackers can exploit vulnerabilities in outdated software.
Wireless transmissions are not always encrypted, making information sent via mobile devices easier to intercept.
With users treating their devices in such a blasé fashion, it can be difficult and frustrating for IT specialists to help users avoid security and privacy mishaps—especially when those devices are used for company purposes.
- See more at: http://online.king.edu/information-technology/top-5-topics-in-information-technology/#sthash.C6hMiz0t.dpuf
Consumers who elect to set PINs and passwords for their mobile devices often choose easily deciphered codes, such as 1234 or 0000.
Users may unknowingly download malware disguised as a useful application.
Out-of-date operating systems may pose threats. OS manufacturers periodically release security patches and fixes, but it is up to the consumer to update their devices. Older devices may not support new updates to the OS.
Out-of-date software presents similar security risks. Attackers can exploit vulnerabilities in outdated software.
Wireless transmissions are not always encrypted, making information sent via mobile devices easier to intercept.
With users treating their devices in such a blasé fashion, it can be difficult and frustrating for IT specialists to help users avoid security and privacy mishaps—especially when those devices are used for company purposes.
- See more at: http://online.king.edu/information-technology/top-5-topics-in-information-technology/#sthash.C6hMiz0t.dpuf
0 comments:
Post a Comment