Smartphone —-a device used for personal banking, computing, digital banking, businesses all over the world. Mobil device security is the most important Concern. In information systems, smartphones are used for their work.
This technology causes profound changes in the source of new “risk” Data compiled and collected by Smartphones must be intellectual property. Like computers, smartphones are the next target of cyberattacks.
Exploits weaknesses inherent in a smartphone, threats are exposed related to smartphone security. San Francisco RSA conference cybersecurity expert Aaron Turner and Georgia Weidman described two factors:
1. Authentication
2. BiometrIc
For phone security.
A password is a common way used for smartphone security. Authentication and biometric are safer but certain caveats are there. SMS based applications are less secure than google based.
iOS Vs Android
Turner clears that -Android phones are also good comparatively iPhones. He said ” good experience with Motorola and Nokia Android devices.”
Weidman said that “iOS is still good, but Android’s SELinux is the bane of my existence as someone who’s building exploits.”
Don’t Buy Samsung Phones
Turner takes a firm stand on Samsung. I also accepted that some findings were not accurate.
“Karsten Nohl showed that Samsung was faking device updates last year. Stop buying their stuff.”
Biometric
A fingerprint is an option to popularly used passwords, face Reading Or voice reading. However, Turner was more skeptical ” I am fundamentally opposed to using biometrics because it’s non-revocable, “citing a case when a gang cut off a man’s finger to gain access to his car that was fingerprint-protected, “fingerprint readers are biometric toys.”
Hardware is the right key for security without authentication. Cyberattacks targeted crypto Applications. There must be conquered inbuilt hardware security to digital assets.