MORE DATA LEAKS FROM MOBILE DEVISES IS EXPECTED THIS YEAR

MORE DATA LEAKS FROM MOBILE DEVISES IS EXPECTED THIS YEAR

We anticipate more data leaks from mobile devices through suspicious mobile applications and fake Wi-Fi access points this year.

I have spoken many times about the danger on Mobile applications and Free Wi-Fi - I urge everyone to pay close attention when installing new mobile applications or when using free Wi-Fi.

Danger on Mobile application: Not all mobile applications do us good, some still data, Snooping and spying from our devices. If you read those warnings, you will see an application saying- for example, It will go through your contacts, files and pictures some even warn that they can take a picture of you. But mostly accept and keep installing them.


Danger on Free WiFi: These public Wi-Fi like the one we see on the Airports and other public places are meant for a good reason, Providing internet access to users for free, But cyber criminals are also using them to eavesdropping those data transferred from one mobile device or laptop to another. This cause all that we type on our devices end up in wrong hands.

One may type password, or performing online banking using this Wi-Fi where a cyber criminal has setup a means to capture those data transferred and end up taking control of our accounts. If we use this public Wi-Fi, We should not do any sensitive things that could then cause harm if fallen to a wrong person.


We need to use secure passwords and take care when using public Wi-Fi, opening emails and visiting websites.

We have pushed warnings on Mobile applications and encouraged users to read them before installing mobile applications. Importantly we urged users to only install application they truly need and those application should come from reputable source.

We also expect a rise in “CEO email scams” – in which fraudsters impersonate senior executives of companies and send emails to trick staff into transferring funds to them.

We have seen the rise on the same through our mobile devices via short massages in Tanzania, Where fraudsters/Cyber criminals use someone's number to request money.

During my recent interview with a local radio station named Radio One Stereo, I urged users to verify whenever they receive massages or mails requesting money or personal details. We should NOT just respond absent Verification.

Lastly, I urge every one of us to THINK before we INK – We should always think twice before we write or post on social media and other digital platforms.

Will Isaak

Senior Parliament official

8 年

Noted Mr. Kalileo. Please email me the article to [email protected]

回复

I like it brat, you have delivered a very good message at a right time

Mohamed Omar MBA, BSc,CSMP? M.ISMI, M.ISRM, CAS, SAS-AP, FHEA

Researcher | Academic | Policing & Security Consultant | Transforming Research into Impactful Solutions & Apply to Real-World Challenges

8 年

I agree and there has been an increase of public Wi-Fi's. The threats are likely to increase this year and public awareness needs to be increased for protection and prevention. https://www.techrepublic.com/article/experts-predict-2017s-biggest-cybersecurity-threats/

要查看或添加评论,请登录

Yusuph Kileo的更多文章

  • Fighting Ransomware Attacks

    Fighting Ransomware Attacks

    substantial increase of Ransomware attacks across the global, has drawn considerable attention in recent years – and…

  • WHAT NEXT AFTER THE WATER SUPPLY ATTACK?

    WHAT NEXT AFTER THE WATER SUPPLY ATTACK?

    The attack against the water supply in Florida, lands worry about the potential for future and copycat attacks against…

    2 条评论
  • 2021 CYBERSECURITY CHECKLIST: PROTECT YOUR SYSTEMS AND NETWORKS FROM A CYBERATTACK.

    2021 CYBERSECURITY CHECKLIST: PROTECT YOUR SYSTEMS AND NETWORKS FROM A CYBERATTACK.

    As the pandemic continues to unfold, organizations are operating in a real-life multi-stress environment, facing cyber…

    6 条评论
  • PREVENTING CYBERATTACKS BEGIN WITH YOU

    PREVENTING CYBERATTACKS BEGIN WITH YOU

    If you have not yet fallen victim of Cyberattacks, you should know it is just a matter of time before you fall victim –…

    2 条评论
  • SECURITY CHECKLIST ON SOCIAL MEDIA

    SECURITY CHECKLIST ON SOCIAL MEDIA

    We have witness a rapid growing of social media users – We have more than two billions active social media accounts. Do…

    4 条评论
  • Addressing Fraud challenges in mobile financial services - Nairobi

    Addressing Fraud challenges in mobile financial services - Nairobi

    With the fast evolving and advancing digital financial services through technology enablement that has surpassed…

    2 条评论
  • CYBERAWARE: RECOGNISING SIGNIFICANCE OF CYBER SECURITY AWARENESS.

    CYBERAWARE: RECOGNISING SIGNIFICANCE OF CYBER SECURITY AWARENESS.

    In terms of global communications, the world is going through the most exciting period in human history. Now people are…

  • KNOWING WEAKEST LINKS TO CYBER SECURITY CHAIN

    KNOWING WEAKEST LINKS TO CYBER SECURITY CHAIN

    Despite growing threats in the cyberspace, only a few organisations consider this situation as critical,and have put…

    3 条评论
  • THE INSIDER THREATS ARE GROWING

    THE INSIDER THREATS ARE GROWING

    We now leave the most exciting period in human history, Life has been simplified with the existing technology – Our…

  • PREVENTING SECURITY BRITCHES

    PREVENTING SECURITY BRITCHES

    Authentication: This involves the prevention of unauthorized access to computer systems. Authentication takes a variety…

    2 条评论

其他会员也浏览了