Feature

Mobile Enterprise: Prevent Identity Theft and Wire Tapping

3 minute read
Marisa Peacock avatar

This week, the mobile enterprise addresses security threats that pose the biggest threats to mobile users.

A Mobile Solution for Wire-Tapping

In this day and age ofadvanced cyber security risks, it’s important to remember that good ol’fashioned wire-tapping is still a potential threat for mobile users. But, thanks to Giesecke & Devrient (G&D), which introduced a newmicroSD card, users can prevent cell phone tapping. The Mobile Security Card Voice Edition (VE) 2.0contains a cryptocontroller that encrypts cell phone conversations andsecurely authenticates the user. The card, designed for companies who carry a high risk of cell phone conversations being tapped into, fits into the microSD slot incell phones and smart phones.

MobileSecuriteCardVE2.0.jpg

Byusing two-factor authentication, both the card and PIN are needed toconfirm a user’s identity. As well, G&D employs a longer than usualencryption algorithm key that is making it much harder to decipher. With 2GB memory, the Mobile Security Card VE 2.0 is supported by the WindowsMobile, Blackberry, Symbian, Android and Linux mobile operating systemplatforms.

Don't Lose Your Identity

Haveyou be smished lately? What about vished? No, these aren’t games, but newterms the FBI is using to classify mobile phone threat variations ofphishing. Smishing uses SMS texts to initiate the scam, while vishinguses automated phone calls.

Learning Opportunities

Methods for identity theft areever-evolving, ordinarily we’d proceed as usual, but because many mobileusers are novices in regard to computer security threats, many aresimply unaware that they are at risk when they respond to text and audiophishing on their mobiles.

Smishing attempts can take the form oftext messages and voice messages, which come to your phone displayingmessages like "We’re confirming you've parcel delivery”, “Your accountstatus as been changed or ABC credit card is confirming your purchase."Unaware users may be given a phone number to call or a website to logonto to provide account credentials to remedy the issue. The user mayalso be directed to a spoofed website, designed to mislead a user intoproviding personal information, which is in turn routed to the scammer'scomputer.

So what can you do to protect yourself? The FBI recommends the following:

  • Do not respond to text messages or automated voice messages from unknown or blocked numbers.
  • Do not respond to unsolicited (spam) email.
  • Do not click on links contained within an unsolicited email.
  • Only open attachments from known senders. Avoid filling out forms contained in email messages that ask for personal information.
  • Contact the actual business that supposedly sent the email to verify if the email is genuine.
  • Verifyany requests for personal information from any business or financialinstitution by contacting them using the main contact information.

Finally, if you suspect that you’ve been the victim of any cyber crime, it’s recommended that you file a complaint via the FBI’s Internet Crime Complaint Center (IC3).