Mobile Security Issues

Cards (8)

  • Android package (APK) source: Install from trusted sources only.
  • Developer mode: Allows hackers to do unsolicited modifications to the device.
  • Root access/jailbreak: Gain administrative privileges.
  • Bootleg/malicious application: Illegally distributed software that can potentially harm the device.
  • Application spoofing (e.g., Fake MS word): An app that disguises itself so that it appears like it is coming from a trusted source.
  • Common symptoms of a compromised network include high network traffic, sluggish response time, data-usage limit notification, limited or no internet connectivity, high number of ads, and fake security warnings.
  • Leaked personal files or data is a common symptom of a compromised network.
  • Sideloading: Installing apps from untrusted sources.