If you’ve ever forgotten your phone or left it at home for the day, you will have realised just how much you use it. On average, we check our mobile phones about 110 times a day. Using them for just about everything, from summoning an Uber car and paying for our latest Amazon purchases, to receiving prescriptions and even tracking shares and trading on the stock market.
Unsecured mobile phones are among the top seven major causes of security breaches and your mobile number is all a hacker needs to start the attack. Using your number, hackers can send you a text message containing a malicious link, which when clicked allows them to read your texts, listen to your calls and even track your whereabouts.
Smartphones are valuable targets for hackers – more so than laptops or personal computers. This is because they can be used as a “pivot point” to attack heavily protected environments such as banks or critical national infrastructure. Hackers can redirect their malicious traffic through your phone and store collected data on it. This means that all forensics traces would point to you as the hacker rather than the real culprit.
On top of this, most phones are open to attack 24 hours a day, seven days a week, often with only limited security features in place. Combine this lack of security with the fact that most modern phones now contain more processing power than the computers that landed Apollo 11 on the moon, and it’s not hard to see why they are a hacker’s weapon of choice.
Under attack
The worst case scenario? You could wake up one morning to the police kicking down your door, investigating a sophisticated cyberattack with all the evidence pointing to you. Regardless of how ridiculous it may seem, in the absence of any cyber-monitoring or cyber-defence solution you would have a very hard time proving that you were not guilty. And it is not just hackers you need to worry about, even the US National Security Agency and the UK’s GCHQ have secretly used innocent people’s devices to cover their malicious activities.
In my career as a cyber forensics investigator, I have not only seen many of these cases but also scenarios where hackers have been hired by organisations to deliberately frame employees by planting material such as child pornography onto their work phones. The person in question is then accused, for example, of selling secret company information to competitors and when the legal team investigates their phone, they find the child pornography. It is a scary prospect.
Many people wrongly believe that their mobile service providers should deploy cyber-protection mechanisms for their users. But if you read the terms of service, you will clearly see that as the owner and user, it is solely your responsibility to protect yourself. Exactly in the same way that you protect your laptop when you surf the internet.
If you are reading this and you are yet to install at least an anti-virus application on your phone, stop reading immediately and install one – there are many good anti-virus applications that are completely free. You should also make sure to only install applications from well-known app markets such as Google Play or the Apple or Windows Stores. Never “jail break” or root your phone to install free apps unless you are a security expert and know what you are doing.
And it may sound like common sense, but do not click on the links you receive from unknown sources. It is also a good idea to have all your phone data encrypted and to install a logging or monitoring solution on your phone to have records of all activity. It could well turn out to be your “get out of jail free card” – just on the off chance anything were to happen.
Ali Dehghantanha receives funding from FP7-PEOPLE-2013-IIF - Marie Curie Action: "International Incoming Fellowships" Project reference: 625402.
Ali Dehghantanha, Lecturer in Cyber Security and Forensics, University of Salford
This article was originally published on The Conversation. Read the original article.



European Luxury Market Set for a Strong Rebound in 2026, UBS Says
Bitcoin Smashes $93K as Institutions Pile In – $100K Next?
EU Prepares Antitrust Probe Into Meta’s AI Integration on WhatsApp
Ethereum Bulls Reload: $175M ETF Inflows + Super-Whale Grabs $54M ETH as Price Coils for the Next Big Move
Coupang Apologizes After Massive Data Breach Affecting 33.7 Million Users
TSMC Accuses Former Executive of Leaking Trade Secrets as Taiwan Prosecutors Launch Investigation
OpenAI Moves to Acquire Neptune as It Expands AI Training Capabilities
Sam Altman Reportedly Explored Funding for Rocket Venture in Potential Challenge to SpaceX
Australia Moves Forward With Teen Social Media Ban as Platforms Begin Lockouts
Nexperia Urges China Division to Resume Chip Production as Supply Risks Mount
Wikipedia Pushes for AI Licensing Deals as Jimmy Wales Calls for Fair Compensation
Vietnam’s Growing Use of Chinese 5G Technology Raises Western Concerns 



