1 hour 1 minute
so welcome back to mobile device Security Course. In previous video, you have been able to see who are is responsible for mobility, where, security and what are the responsibilities off different people. If you're using the company phone or mobile device
in this video, I'm going to talk about how to secure mobile devices. And particularly, I'm going to talk about the ways to secure mobile devices in general. And then I'm going to talk about some specifics and securing phones and tablets,
and I'm going to talk about some things regarding specifics and securing notebooks. But I'm going to talk about these also in the next video in detail.
So, uh, when you talk about loss or theft,
uh, you need to find a way
to secure your device when
from being stolen. Now, if you're, for example, taking having with yourself mobile phone and if you're dealing with very, very skilled pickpocket, there is not much you can do about preventing them from actually taking it away from you unless you're holding it in your hand. But
even then, somebody can just push you
and your device. Can you conduct your device like mobile phone and then somebody can grab you, grab it and ran away with it or something like that. But the most important thing we're talking about is your mobile phone being taken away from you without your knowledge
and to prevent yourself from being exposed to this kind off technique. Off committing cyber crime
You should have a simple Bluetooth tracker pair video, mobile phone or tablet, or even your PC. Now there are a couple off types of mobile trackers, or blow to trekkers.
One is being attached to the device,
but it absolutely makes no sense when using mobile phone. Because if somebody just steals your mobile phone, they can detach tracker
forcefully or with simple just removal and believe it next to you. So there is no way that you know
that you're more well. The rest is being stolen or temporarily stolen. So there are
devices that can be paired with your mobile phone, and you can keep them somewhere on your person, where
can be easily accessed
something inside some zipped pocket or somewhere.
And then if somebody takes your mobile phone and gets out of the Bluetooth range, your device will be
give up some kind of alarm signal.
Also, there are some of these devices that have buttons on them, and if they're stealing range and you press ah, this button for a longer period of time or a couple of times like a double click,
the software on your device will also give a sound that you have defined or some kind of alarm,
which is also good for finding a phone that you have misplaced.
But of course, if you're for example, having your notebook with you, you can put it Ah, this device in the in the same bag or backpack where, you know, book is. So if somebody steals your entire bag, um,
your device will beep when it's away from you. So,
for example, you have a software on your mobile phone and you're no book is in your bag, and there is a tracker in your bag, and when they steal it and they get away from you for a couple of meters or something like that,
it will be so. It's good when you're traveling on the airports, on bus stations of railway stations. This is a very good solution.
The next thing you can have is some kind of tracking software for PC or tablet.
Now the problem with tracking software is that if somebody steals your device
and if they're smart enough, they're not going to turn it on when it's connected to a network
and you're tracking software can work on Lee if your device
eyes connected to a network so you can find it through
some code, or because these after is usually offer some kind of cloud base.
Uh, finder, where you can look from any other PC or some mobile device
and defined where your devices.
So the next thing is and this is available. Most liminal books and maybe some tablets
is that you can have hardware tracking like until be pro,
which is essentially embedded in the process area of device. So wherever your device, if you're be pro tracking, is is on and
somebody who stole your PC locks on network logs connected to Internet anywhere in the world,
even if they wipe the entire disc off your PC,
uh, you'll still be able to find it because this software it works on process of level is coming, and it's completely independent off
operating system you're using. It's actually activating before the operating system is starting.
So when we talk about fake and militias WiFi spots,
the first thing is, don't connect to WiFi you don't trust.
So when in public Place always asked for a name of the network and passport, somebody who you know works that publicly is, for example, a restaurant.
So if you see that there are two similar networks available, check the one that you're 100% sure it is of the place. But even then, you have seen it's not safe, because what they can do is they can switch off the network of the restaurant and put in place their own by five connection,
which is of course, being wiretapped.
And he has the same name, so
it really is not helping.
Uh, but the other thing is that if you're logged in a public network, always use VPN if it's available on your mobile device. So if you're using the company should know book, for example, and you're logging on the public network
Immediately after logging, you establish a VPN connection between your PC and your company's server, and then you are safe, regardless off. If somebody's wiretapping, your
de y your network traffic or not?
so if no safe WiFi is available,
then rather use mobile data, even if it costs more. So,
yes, it costs more. But what is the most expensive thing is if they get your data, our, for example, your banking application password or something like that, that can cost you much more.
So just for phones hacking through mobile network, if they are wiretapping through s a seven,
there is no defense against it. But what you can do is to avoid encrypted, uncredited communication. So, for example, text messages so SMS
they can see But you for using some
of encrypted communication tool like bots, half or whatever.
Uh, so so some software. These messages go from your phone to the server in the crypt in form and the fact that they're trapped tracking the traffic doesn't help them a lot.
Pretty much the same goals. If we're being eavesdropped, why I am aside, catcher. So
these are the same things. So just
just try not to use any unencrypted information. If you can call through services like fiber, so make calls through it.
Ah, then, um,
it's much more difficult as, or even impossible for the other people who are is it is working to listen to your conversation.
So also for phones and tablets talking about Melber backdoors in spyware.
Never leave your phone or tablet and intendant when in public spaces because they said if it's an android device, it can be just a couple of minutes before they can install malware on your device.
Uh, never connect your phone or tablet to any USB cable or outlet that is not 100% trusted Now. Today we have notebooks as well, which are can be charged through USB port.
But you know as well that you cannot use form charger to charge a PC because the voltages different forms, they're usually and five worlds and PC's air usually on 15 or 19 or 20 worlds.
So you wouldn't do that anyway. But when it comes to phone or tablet, just don't do that, Or if you have to do it,
uh, you charge only cable. So when you look at the U. S. B cable and this is the old USB type A connector, the inside the two pins are
used for data and the outside ones are used for power.
So if you can just
scraped these two inside beans and remove them, then you turn any regular USB cable into charge. Only cable. There are also whale below the the adapters on online that you can buy for reasonably small amount of money that can. They have, ah, one male and one female connector,
and you just plug it into charging port. And what comes out on the other side of this power? Only no data. So
you're safe regarding that thing.
So these air advice is, uh, in this video and
a T end. I'm just going to mention that in this video you have been able to learn how to protect your mobile devices and some specific actions for protection off phones and tablets. And the next video. I'm going to talk about some specifics regarding protection off notebooks
End User Cyber Fundamentals
This End User Cyber Fundamentals course covers Internet risks such as typosquatting, website spoofing, drive-by ...
2 CEU/CPE Hours Available
Certificate of Completion Offered
Android Development Fundamentals
Android users dominate the mobile market, so the demand for Android developers is high. This ...
4 CEU/CPE Hours Available
Certificate of Completion Offered