1 hour 1 minute
In previous video, you have seen the general idea of how the mobile devices air being attacked
and some specifics regarding
the hacking or attacking the mobile phone.
Now, in this video, I'm going to talk about
things that they're specific just for tablet
or and a PC. And when I say PC, I mean a notebook PC because we're talking about mobile devices.
So when it comes to tablet the same thing, like with mobile phone, they can intercept communication that is happening when you connect to free WiFi.
Then, of course, the free charges that could be dangerous. And I'm going to explain a little bit in detail how
and, of course, the same thing with Mobil's for mobile phones. They can get hold of your tablet for a short period of time, and depending on the operating system and the protection you have there, they can access it, especially if it's android device. They can break the protection, get inside.
In fact, your device get it back on and then they have ah,
everything you do on the device in the future. And of course, this device can be infected to our fishing male. And this goes for all tablets, regardless off operating system they're using. So fishing males are the most dangerous thing.
So when you talk about charging charging points, there is something like this
where you can just plug your phone into
by USB into the wall charger and you're using your standard USB cable that you have with yourself and you take it everywhere.
Then you can have something like this. Uh,
it's a little bit older thing with the connections for all older type off mobile phones
today. They're all pretty much using some kind off USB or data slash power connection
on. And, uh, when you see the cave cable like this, this is the most dangerous thing to do. It is very rare to see charging point like this where you actually can plug in your charger and charge your phone.
Um, this is safe. So if you see this one and you have your charger with you, just plug in your charger and you can charge your phone and you are absolutely safe. So, um,
I will talk later about how to solve a problem of public chargers. But if you don't have the things that I'm going to talk about
Now we're coming to ah, talking about hacking and notebook
and, uh, when there are some things that are typical for all mobile devices that also are valid for notebook. The 1st 1 is intercepting communication by a free WiFi,
and the second thing is that it can be infected by phishing email.
And I'm going to talk a little bit more about what the phishing email is.
Eso that you understand how important is to take care of it.
So free WiFi. Same thing. If it is an open line and it's being wiretapped, all the data that's coming through from your PC and other pieces connected to that WiFi spot
is being can be recorded, and in the case, they can extract something from it. For example, if you're typing your mail password, they can
have it, and then they can access it in the future.
But phishing emails are demos. Dangerous ones,
uh, unlike, uh,
intercepting communication where free WiFi,
which requires equipment funds, organization phishing emails, can be sent from one PC and then whoever gets infected, it Mel, where
you can do whatever you want or whatever you intended to that PC.
it requires no investment whatsoever. You just need
the knowledge to make a phishing email on toe have or to create member of your own.
So a phishing email is basically an email sent from militia with malicious intent for militias, person
and in some way that email is infected so the infection can be in within the text body off email
and again, If you want to see how to protect yourself from phishing email, you should take a more detailed
Ah, look at the course about and user email security. But let's just mention that there are ways that if you're reading emails from email client, you don't accept it. You don't accept reading emails in HTML format.
And the other thing is, you should take care about any links or attachments in email.
So I'm going to talk a little bit
more about that further down in this course.
So, uh, phishing emails.
You need to be able to spot them unless they are really, really carefully prepared. They looks at like some generic emails and from somebody you don't know or
you almost don't know, and they're offering you something. You just have to click on the plane core that just giving you some brochure that you need to read.
Just delete these emails or try to find the actual center of that email
and then try to contact that person and check if they actually sent you that email.
uh, what are there some other few mobile device related attacks that I shouldn't mention as well
and the first of all his shoulder surfing? So if you're typing something on your mobile phone or your tablet or on your notebook, and if it's sensitive information like, for example, you pass board,
make sure that nobody is looking over your shoulder or somebody sitting next to you is able to see that.
this is a typical example. You're in the public transport, your typing, something it might be or password for your banking account.
And if somebody sitting next to you and I can see what you're doing, they can memorize these things, and people are actually doing that all the time. Of course, the number of people that are doing these things and they
are able to memorize these things unless they're carrying a camera, they need to memorize it
they're not so many of them. But anyway, just beware that nobody's looking when you're typing something important. Tal reading some confidential email
and the second thing we need to talk about here is social engineering. Now social engineering is a technique hackers use, and basically they're trying to convince you to do something that you normally wouldn't do, which is dangerous from a security standpoint.
One typical thing and I'll given an example is, um,
you find yourself in some place, some conference something, and
you think, OK, there is nobody there that's going to do me any harm. And then at one point, somebody comes Teoh showing their phone, which is dying or dead battery, or said My phone is dead or broken or something,
and I had need to urgently call my daughter or my wife. Something's wrong.
Can you give me your phone? I give you the number, you dial it in so it gives you some extra confidence.
And what you do, you
do that. You dial that number, give them your phone
and then they're not going toe talk directly into your face. They just turn around
and then they can plug something in the U. S. B port of your phone. And while they're pretending to talk or actually talking, they they can insert some member in your phone because it's unlocked so they don't have to bother
toe. Unlock it, and it may take 30 seconds or one minute or a couple of minutes
before they have installed the back door, or spyware and malware on your phone
and they're gone, they say. Okay, thank you very much. Goodbye.
And after that, the malware can connect to their server, and
they can connect to your phone and wiretap whatever you're doing or listen to your conversations or just get the data from your phone, find your passports and do whatever they want to do with it in the future.
So this is the thing that you should also be aware of. Off course. One other thing. Never give away your passwords to anybody
unless he's 18. Your company in your 100% sure that their i t. So if somebody calls you by the phone and say, Okay, I need your PC password, whatever,
just to access it, don't trust them. No, I t person needs your password unless they're sitting next to you and doing something on your PC while you're locked in. If if you're working for any serious company,
every PC has administrator account for which they have password. So if they need to do something with your PC, they don't need your
the last word.
Okay, so in this video, you have learned about the ways that
cyber criminals can get access to a tablet on your notebook or laptop PC mobile PC and some other hugging techniques you should be aware of. So this is the end off
this lesson, and in next video, I'm going to talk about responsibilities for mobile device security.
End User Cyber Fundamentals
This End User Cyber Fundamentals course covers Internet risks such as typosquatting, website spoofing, drive-by ...
2 CEU/CPE Hours Available
Certificate of Completion Offered
Android Development Fundamentals
Android users dominate the mobile market, so the demand for Android developers is high. This ...
4 CEU/CPE Hours Available
Certificate of Completion Offered