Buyer Be ‘Diallerware’

The mobile Internet does not have to be a risky environment, but….

It probably goes without saying that being a smart person is not a prerequisite for owning a smartphone.

Just take a look around you.

For more concrete evidence, consider the somehow disturbing results of a study conducted by the Ponemon Institute, a Traverse City, Mich.-based research center dedicated to privacy, data protection and information security policy. After a random but indepth poll of 734 adults regarding their mobile communications behavior, the institute in March released “Smartphone Security: Survey of U.S. Consumers,” a report that, bottom line, points to not-so-smart phone use by our citizenry.

Apathetic Situation
One of the report’s recurring themes focuses on consumers’ apparent indifference to the many serious security risks associated with the storage and transmission of sensitive personal data on iPhone, BlackBerry and Android devices.

For example, while 65 percent of respondents said they do worry about the security of their desktop or laptop computers, 62 percent admitted that when downloading software to their smartphone they do not always check to see if the app is from a trustworthy source, and 58 percent said they do not worry that a hacker might attack their device. In the same vein, 56 percent flatly said they do not feel their private information is at all at risk when they use their smartphone.

Those percentages represent odd and seemingly incongruous numbers because, meanwhile, 60 percent of the same respondents said they were definitely aware of receiving unwanted marketing messages based on their smartphone use, and a full 55 percent said they understand that they may be putting confidential business information at risk when using their smartphone for both personal and work use (a “cross-over” practice that 84 percent of users say they do all the time).

Among other highlights of the report:

  • 89 percent of respondents said they were unaware that smartphone applications can transmit confidential payment information such as credit card details without the user’s knowledge or consent.
  • 90 percent of respondents said they were either unaware or unsure of the fact that smartphones can be infected by specialized malware called “diallerware” that enables criminals to make use of premium services or numbers resulting in unexpected monthly charges -- charges that most users apparently miss altogether because 94 percent said they do not check their mobile bill or statement closely every month, and only eight percent check their statement when the bill is higher than usual.
  • Despite these and other security risks, less than half of those polled said they use keypad locks or passwords to secure their smartphones, and only 29 percent said they have considered installing an antivirus product to protect their device.

Street Smarts?
According to the study, the most popular smartphone use next to using it to actually conduct verbal conversations (100 percent of users say they do still resort to this old-school way of communicating) is to use it to check both personal and business e-mail. Using the device as an address book, as a tool for texting and as a vehicle for browsing the Internet are the other top uses.

The least popular smartphone functions are for banking, travel assistance and video conferencing. Researchers at Ponemon, which also is the parent organization of the Responsible Information Management (RIM) Council, conclude that because most people are not using their smartphones for such transactions, they have a mistaken perception that they are somehow immune from potential breaches.

“Because consumers believe its primary use is as a phone or to e-mail, they may think (incorrectly) that there are negligible security or privacy risks,” researchers say in the report. They add that consumers’ misperceptions “could be attributed, in part, to the lack of information being published about smartphone security risks.”

For the Record
Inasmuch as that might be true, here are a few more tidbits from the report that are worth adding to the published literature on the subject:

  • Smartphones can contain just as much sensitive data as desktops and laptops, and if that information is lost or stolen, it could result in financial harm.
  • Sometimes location data can be embedded onto image files such as digital photos contained in your smartphone, enabling other people to track where you are.
  • Some smartphone apps can transmit confidential payment information such as credit card details without your knowledge or consent. Some apps also may contain spyware that allows criminals to access the private information contained on your smartphone.
  • If you connect your smartphone to the Internet through a local Wi-Fi network, your device could be open to a virus attack.
  • Smartphones contain basic security protection that can be disabled by “jailbreaking,” which makes your device more vulnerable to spyware or malware attacks.

AVG Technologies sponsored Ponemon’s independent study on the smartphone phenomenon. More insight and caveats -- and the complete survey results -- are available in a white paper downloadable on AVG’s website at http://aa-download.avg.com/filedir/ other/Smartphone.pdf.

“We have increasing responsibility to educate consumers on the dangers lurking in mobile broadband and to help users take ownership of their mobile data security,” said AVG CEO J.R. Smith. “The mobile Internet does not have to be a risky environment, though the industry must work together to encourage users to take action by downloading low-cost or free antivirus products specifically designed to protect mobile data.”

This article originally appeared in the May 2011 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West 2024: Post-Show Recap

    ISC West 2024 is complete. And from start to finish, the entire conference was a huge success with almost 30,000 people in attendance. Read Now

    • Industry Events
    • ISC West
  • ISC West 2024 is a Rousing Success

    The 2024 ISC West security tradeshow marked a pivotal moment in the industry, showcasing cutting-edge technology and innovative solutions to address evolving security challenges. Exhibitors left the event with a profound sense of satisfaction, as they witnessed a high level of engagement from attendees and forged valuable connections with potential clients and partners. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3