My Ubuntu for mobile devices post mortem analysis

By posted on December 31, 2018 3:24PM

VTo recapitulate my involvement within the mission: I had been using Ubuntu Touch on a Nexus 7 on an on-and-off-foundation between its announcement in 2013 and December 2014, commenced working on Click apps in December 2014, started writing the 15-element “Hacking Ubuntu Touch” blog post series about system internals in January 2015, have become an Ubuntu Phone Insider, were given a Meizu MX4 from Canonical, organized and subsidized the UbuContest app improvement contest, worked on computer virus reviews and apps till approximately April 2016, and then sold off/converted all my last devices in mid-2016. So I assume I can offer some mind approximately the challenge, its demanding situations and wherein we ought to have carried out higher.

Today’s smartphones are very powerful and can access as much confidential information as networked computers. Modern mobile platforms are incredibly capable and are routinely used by people who are on the go and in environments that are insecure. The sensitivity of the information being sent and received virtually includes any set of confidential information to which the user has access.

Mobile digital equipment faces the same attack vectors as desktop computers (e.g. malware, social engineering, signal interception and overlay attacks).

Additional challenges that are very unique exist. Your smartphone wireless signal, for example, can connect with a fake cell tower being operated by a cyber criminal and gain access to all of your information.

The mobile information security problem is becoming worse. More than two million varieties of malware are in existence and directed against transportable computing devices. A single data breach could potentially bankrupt a company.

One information security news source, ChannelPro, reports that more than 70 million smartphones are physically lost each year with only 7 percent being recovered. One laptop is stolen every fifty-three seconds. Mobile devices are easy to steal.

The security perimeter, in recent years, has been pushed back from the secure space behind a firewall to any location on the planet where a user can make a wireless connection. The user of a smartphone or tablet functions outside of the protection of a computer network and the signal is “in the wild”. Unless robust encryption is being used, any information that is being broadcast through the air can be intercepted and compromised.

The fact that users routinely “sync” their mobile devices with desktop computers is another significant vulnerability. Both devices can easily be infected with malware if one or the other digital hardware has been compromised.

Computing on the go faces all of the typical threats and vulnerabilities as well as a number of new ones. Smartphones or notepads can be individually targeted. Cybercriminals, for example, can gain access to your confidential information by simply observing you work. There are other vulnerabilities. “Texting”, for example, has been known to deliver malware to unsuspecting users that can allow cybercriminals to completely compromise an entire hardware platform.

Smartphones, tablets and other mobile devices must be secured at all times, particularly when they are being used in public (e.g. in an airport). Users should be alert to the threat of having their equipment physically stolen and should take extraordinary steps to protect their data is stored or transmitted.

Smartphones and mobile digital equipment, in reality, are at a much greater risk of being lost, damaged or compromised than a networked computer. Smartphones can easily be stolen but they can also function as a conduit for the transfer of malware when they are synced or used to exchange information with network computers. Now that mobile digital devices

 

Recently Published Stories

Mobile devices are even extra vulnerable

As many as a quarter of enterprise cell devices aren’t only vulnerable to malicious attacks, however, cannot be patched to

Mobile gadgets could improve

SEATTLE – Some kingdom lawmakers are offering a tax on new mobile devices to assist law enforcement to pay for

Gaining Dominance by using Leveraging Engagement

With smartphones increasingly getting used as purchasers’ No. 1 get admission to to the Internet, the cell is gaining sophistication

Pocket Edition’ is coming to mobile devices

One of the fascinating mobile video games of the 12 months just was given a launch date as Square Enix

Your Mobile Phone Can Give Away Your Location

The following essay is reprinted with permission from The Conversation, an online booklet protecting the cutting-edge research.The Conversation U.S. Military

Holiday Shoppers Turn to Mobile Devices Online and In-Store

VANCOUVER, British Columbia, Jan. 24, 2018 (GLOBE NEWSWIRE) — Mobile purchasing ruled the 2017 vacation season with sales up 22%,

Mario Kart is coming to Mobile Devices in 2019

n current years, Nintendo has launched masses of video games for Android. It delivered titles like New Super Mario Brothers

PCI Compliance Comes to Mobile Devices

One of the components of governance, change management, and compliance, or GRC, is compliance. Because compliance regulations alternate so frequently,

TFG now gives clients cyber coverage for cellular gadgets

CAPE TOWN – TFG (The Foschini Group) and neighborhood cyber insurance company Mycybercare have partnered to give clients buying mobile

Sprint offers unfastened mobile gadgets to fourteen

HOUSTON, Texas (KTRK) — Thousands of HISD students acquired unfastened hot-spot cellular devices on Monday. Sprint hosted a kick-off distribution