SmartMoney Blogs

Pay Dirt
A daily look at what we buy, how we spend, and the companies that do right - and wrong - by their customers.

10 Threats to Your Cellphone’s Security


Apple and Google came under fire earlier this year for tracking cellphone users’ locations via their mobile operating systems. But as consumers use their phones for banking, shopping and more, there are even more malicious forces interested in that data and other information on your handset.

Threats to your mobile phone’s security are becoming more prevalent, according to a report released Wednesday by mobile security company Lookout. In January, there were 80 Android apps infected with malicious software, according to their data. By June, there were more than 400. As many as 1 million Android owners were affected, they say.

Here is a list of problems the group says you should look out for:

Malware: Software that’s designed to be harmful. It can be configured to steal information from your phone, or give an attacker some control over the handset to, say, send spam text messages to everyone on your contact list. It’s often hidden in games and other apps, so download only from well-reviewed, trusted developers.

Spyware: Software that collects phone data such as call history, text messages, location, contact lists, emails and camera pictures. The phone’s owner is usually unaware. Read the fine print before downloading to see what data the app wants access to.

Privacy threats: Applications that you know collect or use sensitive data from your phone, like your location or personally identifying information. Some apps are open about using such data for marketing purposes, which is something to consider before you download.

Vulnerable applications: Apps that contain software vulnerabilities attackers might exploit to access information that app has collected from your phone, or remotely take control of the phone. Developers typically offer updates or patches to negate security threats, so make sure your phone’s software and apps are up to date.

Phishing scams: These are attacks designed to trick you into providing log-in information or other personal information. Attackers send links in emails and text messages that redirect users to web pages designed to mimic legitimate businesses, often banks. Avoid clicking on links in emails, and look for telltale signs like misspellings.

Drive-by downloads: Downloads that begin automatically when a user visits a web page. You’re usually lured there by spam or advertising, so be careful where you click.

Browser exploits: These are attacks that take advantages of vulnerabilities in a web browser or supporting software. Make sure your phone’s software is up to date.

Network exploits: These take advantage of flaws in your phone’s mobile operating system. There’s nothing you do that triggers it. Just hope your provider has a good security system in place.

Wi-Fi sniffing: Attackers intercept data from apps and web pages that is sent unencrypted. Be cautious about what you do on your phone, and check that apps or sites for mobile banking are both encrypted and secure.

Lost or stolen devices: Both the phone and the data are valuable these days. Protect your phone with a password and other security measures. The iPhone, for example, has a setting to automatically erase all data on it after 10 failed password attempts.


We welcome thoughtful comments from readers. Please comply with our guidelines. Our blogs do not require the use of your real name.

Comments (2 of 2)

View all Comments »
    • By WebOsPublisher

      Gloved Hand Icon from Medical Icon Set. View stock cliparts for web design. Images: shake hand images,hand held thermal imagers,hand washing image,helping hand images,windows xp icons set
      Gloved Hand Icon. Medical Icon Set
      Toolbar Icons
      Business Icons
      Business Icon Set
      Toolbar Icon Set
      People Icons
      Database Icon Collection
      Network Icon Library
      Icon Editor
      Free Icon Editor
      Toolbar Icons
      Icon Software
      Icon Creator
      Download Web Icons
      Website Icons
      View Icon Set
      Medical Icon Set
      Gloved Hand Icon
      Gloved Hand Icon
      Add Gloved Hand icon to cart
      Purchase Gloved Hand icon for $5.00 now!
      Image sizes: 256×256, 128×128, 48×48, 32×32, 24×24, 16×16
      File formats: BMP, GIF, PNG, ICO
      Purchase entire Medical Icon Set now!
      View Medical Icon Set now!
      Download demo icons
      Tags: powered by icons, icons small on, altenburger icon smi, free emtion icons, icon pictures
      And the extremely plentiful sphere of business: production of monopolies [George A. Stigler,
      "Monopoly and Oligopoly by Merger", chap. 8 in The Organisation of Industry
      (Homewood, Ill.: Richard D. Invin, 1968), pp. 102 - 103].
      If consequences of economic action were defined by motives and
      Intentions, or even hopes of characters, for two last
      Decades of a XIX-th century the American process industry quite could
      To turn to a kingdom of industrial monopolies. But, as usually also happens,
      Final consequences had not something in common with any intentions. [Thomas
      Schelling has largely removed a cover of mystery from that fact that
      Collective consequences of actions of separate people frequently rather differ
      Both from intentions of these people, and from consequences for them. See: Thomas
      Schelling, Micromotives and Macrobehavior (New York: W. W. Norton and Company,
      1978). "The invisible hand" is familiar aspect of the same problem.] Merged
      The companies seldom could save the share of the market [Yale Brozen, Concentration,
      Mergers and Public Policy (New York: Macmillan Publishing Co., 1982), pp.
      214 - 218]. Sometimes they could not save growth rates, characteristic for them
      Branches, and at times it it was necessary to comprehend that it is impossible to save the share
      The market at attempts to supervise the price. [The commanding the market firm can
      To supervise the prices, reducing own production. To save the
      Share on an advancing market, it is necessary to expand production, on the contrary.] by words
      - , “… With the course of time a market share of the companies which have arisen in
      Result of merges, almost everywhere essentially decreased “[in the same place, with. 102].
      Except reduction of their share in the market trusts had also other problems. Even the such
      Exemplary trust as “Standard Ojl”, extracted profits mainly for the account
      Cost-savings and appointments of the same prices, as at competitors [F. M. Sherer,
      Industrial Market Structure and Economic Performance, 2d ed. (Chicago: Rand
      McNally, 1980), pp. 336 - 337] – and to trusts which could not reduce the
      Icons | Icon Sets | Download Icons | Order | Support
      Copyright © 2006-2012 Aha-Soft. All rights reserved.
      Individual Ready Icons
      You can buy individual icons to suit your needs. Each icon is $5 when purchased individually.
      Icon Usage Agreement
      Software Toolbar Icons is a set of top-quality handcrafted images designed by experienced artists for developers and webmasters. This icon pack represents a broad range of software-related topics.
      More info
      Large Weather Icons represent a number of weather conditions that are common for software, weather portals, and mobile gadgets. The images are supplied in typical sizes standard to Windows, Mac OS, and other platforms. The largest versions are huge 512×512 pixel images with vector sources in Adobe Illustrator (.ai) format easily affordable and ready to be printed or used in presentations in highest quality.
      More info
      Business Icon Set is a library of top- quality stock icons for use in programs and on Web projects. They are provided in a variety of formats, sizes and color schemes.
      More info
      Free 3D Social Icons represent a free icon pack specially designed for websites and software projects dealing with all sorts of social networks. The pack delivers images for various communication technologies and web-sites.
      More info
      12×12 Free Toolbar Icons set contains all the images that are necessery for your web project or application toolbar.
      More info

    • There a product that blocks out all transmission. I got one here in LA at a convention. It was $20 and called Hushpocket. The guy did a demo in front of me and it worked in 2-3 seconds. It blocked out the call. Then he did another one with gps google map. and after 5 seconds in the hushpocket, it said “signal was lost” a great product for the security conscious person. I think it perfect for celeb or attorneys… what about finance managers!!

About Pay Dirt

  • Pay Dirt examines the millions of consumer decisions Americans make every day: What to buy, how much to pay, whether to rave or complain. Lead written by Quentin Fottrell, the blog examines these interactions, providing readers with news, insight and tips on shopping, spending, customer service, and companies that do right – and wrong – by their customers. Send items, questions and comments to quentin.fottrell@dowjones.com or tweet @SMPayDirt.