-
Third-Party App Stores
- To be more secure on your mobile device, do not download software from untrusted sources
- Download apps from a legitimate source. If BYOD is in place, use company-approved apps.
-
Rooting/Jailbreaking
-
Rooting (Jailbreaking) a mobile device should not be performed for three reasons:
- The programs that perform jailbreaking often install malware on the mobile device.
- A mobile device with custom firmware (aka a Custom ROM) is more susceptible to root access from other attackers.
-
Firmware OTA Updates
- A rooted mobile device may not receive Over-the-Air (OTA) firmware updates.
-
Sideloading
- Loading third-party apps from a location outside of the official application store for that device.
-
This can occur:
- by direct Internet connection (usually disabled by default)
-
by connecting to a second mobile device
- USB On-the-Go
- Bluetooth
- by copying apps directly from a microSD card
-
Carrier Unlocking
-
SIM (Phone) Cloning Attack:
- Version 1 SIM (Subscriber Identity Module) cards had a weak algorithm that allowed an attacker to clone the information on a SIM card and use it themselves.
- Version 2 and above SIM cards are much more difficult, if not impossible to clone due to a stronger algorithm.
- Users should ensure they are using a Version 2 or later SIM card.
-
Carrier Unlocking:
- The process of unlocking a mobile device from its carrier (service provider). Unlocking the device effectively takes it off the grid, making it difficult to track and manage.
- When the SIM is wiped, the International Mobile Subscriber Identity (IMSI) is also lost and cannot be recognized.
- However, the smartphone may still be identified by the International Mobile Equipment Identity (IMEI), Electronic Serial Number (ESN), or Mobile Equipment Identifier (MEID), depending on the type and age of the device.
-
Permissions
- Camera Use
- SMS/MMS
- External Media
- Recording Microphone
-
GPS Tagging
- Your security policy should clearly define whether GSM (satellite) services are enabled or disabled on your organization's devices (there are certain pros and cons either way).
- Privacy and data security (potential corporate espionage) are the two main concerns, which should be addressed when defining your organization's security policy.
- However, if a device is lost or stolen, remote wipe and tracking require GPS.
-
Wi-Fi Direct/Ad Hoc
- Unapproved Ad Hoc networks are a security risk because they present an unsecured backdoor into your secure network.
-
Tethering
- Turn off unnecessary wireless features such as mobile hotspot, tethering, and so on. These features reveal information to potential attackers.
-
Payment Methods
-
Wireless Payment methods are an unproven technology. Your information is unsafe for two reasons:
- Your payment information can be sniffed by attackers.
- The app writers have no standard to which they must adhere, such as the PCI DSS, when you provide them with your information. This technology has advanced faster than the regulations meant to control it.