Buyer Be ‘Diallerware’

The mobile Internet does not have to be a risky environment, but….

It probably goes without saying that being a smart person is not a prerequisite for owning a smartphone.

Just take a look around you.

For more concrete evidence, consider the somehow disturbing results of a study conducted by the Ponemon Institute, a Traverse City, Mich.-based research center dedicated to privacy, data protection and information security policy. After a random but indepth poll of 734 adults regarding their mobile communications behavior, the institute in March released “Smartphone Security: Survey of U.S. Consumers,” a report that, bottom line, points to not-so-smart phone use by our citizenry.

Apathetic Situation
One of the report’s recurring themes focuses on consumers’ apparent indifference to the many serious security risks associated with the storage and transmission of sensitive personal data on iPhone, BlackBerry and Android devices.

For example, while 65 percent of respondents said they do worry about the security of their desktop or laptop computers, 62 percent admitted that when downloading software to their smartphone they do not always check to see if the app is from a trustworthy source, and 58 percent said they do not worry that a hacker might attack their device. In the same vein, 56 percent flatly said they do not feel their private information is at all at risk when they use their smartphone.

Those percentages represent odd and seemingly incongruous numbers because, meanwhile, 60 percent of the same respondents said they were definitely aware of receiving unwanted marketing messages based on their smartphone use, and a full 55 percent said they understand that they may be putting confidential business information at risk when using their smartphone for both personal and work use (a “cross-over” practice that 84 percent of users say they do all the time).

Among other highlights of the report:

  • 89 percent of respondents said they were unaware that smartphone applications can transmit confidential payment information such as credit card details without the user’s knowledge or consent.
  • 90 percent of respondents said they were either unaware or unsure of the fact that smartphones can be infected by specialized malware called “diallerware” that enables criminals to make use of premium services or numbers resulting in unexpected monthly charges -- charges that most users apparently miss altogether because 94 percent said they do not check their mobile bill or statement closely every month, and only eight percent check their statement when the bill is higher than usual.
  • Despite these and other security risks, less than half of those polled said they use keypad locks or passwords to secure their smartphones, and only 29 percent said they have considered installing an antivirus product to protect their device.

Street Smarts?
According to the study, the most popular smartphone use next to using it to actually conduct verbal conversations (100 percent of users say they do still resort to this old-school way of communicating) is to use it to check both personal and business e-mail. Using the device as an address book, as a tool for texting and as a vehicle for browsing the Internet are the other top uses.

The least popular smartphone functions are for banking, travel assistance and video conferencing. Researchers at Ponemon, which also is the parent organization of the Responsible Information Management (RIM) Council, conclude that because most people are not using their smartphones for such transactions, they have a mistaken perception that they are somehow immune from potential breaches.

“Because consumers believe its primary use is as a phone or to e-mail, they may think (incorrectly) that there are negligible security or privacy risks,” researchers say in the report. They add that consumers’ misperceptions “could be attributed, in part, to the lack of information being published about smartphone security risks.”

For the Record
Inasmuch as that might be true, here are a few more tidbits from the report that are worth adding to the published literature on the subject:

  • Smartphones can contain just as much sensitive data as desktops and laptops, and if that information is lost or stolen, it could result in financial harm.
  • Sometimes location data can be embedded onto image files such as digital photos contained in your smartphone, enabling other people to track where you are.
  • Some smartphone apps can transmit confidential payment information such as credit card details without your knowledge or consent. Some apps also may contain spyware that allows criminals to access the private information contained on your smartphone.
  • If you connect your smartphone to the Internet through a local Wi-Fi network, your device could be open to a virus attack.
  • Smartphones contain basic security protection that can be disabled by “jailbreaking,” which makes your device more vulnerable to spyware or malware attacks.

AVG Technologies sponsored Ponemon’s independent study on the smartphone phenomenon. More insight and caveats -- and the complete survey results -- are available in a white paper downloadable on AVG’s website at http://aa-download.avg.com/filedir/ other/Smartphone.pdf.

“We have increasing responsibility to educate consumers on the dangers lurking in mobile broadband and to help users take ownership of their mobile data security,” said AVG CEO J.R. Smith. “The mobile Internet does not have to be a risky environment, though the industry must work together to encourage users to take action by downloading low-cost or free antivirus products specifically designed to protect mobile data.”

This article originally appeared in the May 2011 issue of Security Today.

Featured

  • Until We Meet Again

    A short three years ago we were all pondering whether to attend any tradeshows all thanks to COVID-19. Sorry to bring that nightmare up again, but it seems that little pandemic is in the rear-view mirror, and it’s time to meet again. Read Now

    • ISC West
  • Cyber Hygiene: What it Looks Like for IoT Devices

    Cyber Hygiene: What it Looks Like for IoT Devices

    For our second pillar about the Industrial Internet of Things (IIoT) Pillars of Security, we are going to discuss what cyber hygiene looks like for IoT devices. Read Now

  • ISC West Announces 2023 Keynote Series Speaker Lineup

    The International Security Conference (ISC), in collaboration with premier sponsor Security Industry Association (SIA), announced five of this year’s ISC West Keynote Series speakers. ISC West will kick off its annual conference on March 28 (SIA Education@ISC: March 28-30 | Exhibit Hall: March 29-31) at the Venetian Expo in Las Vegas, Nevada. Read Now

    • ISC West
  • Accelerating Security Modernization

    In recent years, the term “digital transformation” has been one of the most frequently used buzzwords across industries. On its most basic level, it refers to the reimagining of how an organization leverages its technology systems to improve business processes. Read Now

Featured Cybersecurity

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • XS4 Original+

    XS4 Original+

    The SALTO XS4 Original+ design is based on the same proven housing and mechanical mechanisms of the XS4 Original. The XS4 Original+, however, is embedded with SALTO’s BLUEnet real-time functionality and SVN-Flex capability that enables SALTO stand-alone smart XS4 Original+ locks to update user credentials directly at the door. Compatible with the array of SALTO platform solutions including SALTO Space data-on-card, SALTO KS Keys as a Service cloud-based access solution, and SALTO’s JustIn Mobile technology for digital keys. The XS4 Original+ also includes RFID Mifare DESFire, Bluetooth LE and NFC technology functionality. 3

  • Dahua 2-Wire IP Video Intercom System

    Dahua 2-Wire IP Video Intercom System

    Dahua Technology is introducing a new line of expandable 2-wire IP video intercom solutions for the North America market. The New 2-wire IP video intercom is more advanced, cost effective, and designed to help businesses increase their security. 3