{"id":22687,"date":"2017-12-06T10:00:15","date_gmt":"2017-12-06T17:00:15","guid":{"rendered":"https://www.webroot.com/blog/?p=22687"},"modified":"2018-05-01T09:38:35","modified_gmt":"2018-05-01T15:38:35","slug":"outsmart-mobile-threats","status":"publish","type":"post","link":"https://www.webroot.com/blog/2017\/12\/06\/outsmart-mobile-threats\/","title":{"rendered":"How to Outsmart Mobile Threats"},"content":{"rendered":"<p>As the holiday season kicks into high gear, keep in mind that shoppers are at an even higher risk of cyberattacks during this time of year. Salesforce projects that mobile users will account for <a href=\"https:\/\/www.chainstoreage.com\/article\/busiest-online-shopping-day-history-will-be\/?tp=i-H55-Q5S-4ZY-6gcpo-1u-1V5n-1c-1ACk-6gSB0-1xRjCU&amp;utm_campaign=Daily&amp;utm_source=Experian&amp;utm_medium=email&amp;cid=17580&amp;mid=98817076\/\">60 percent of traffic<\/a> to retail sites around the globe this year. With the increased popularity of shopping on the go, more and more cybercriminals will move to prey on unsuspecting shoppers. Here are a few tips to minimize your chances of falling victim to cybercriminals this holiday season (and all year long).\u00a0 <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\"><br \/>\n<\/span><\/p>\n<h2>Sophisticated attacks on smartphones<\/h2>\n<p>The fact is, mobile threats are on the rise. The Webroot <a href=\"https:\/\/www.webroot.com\/us\/en\/about\/press-room\/releases\/2017-webroot-threat-report\">2017 Threat Report<\/a> revealed a spike in malicious mobile apps, noting that almost half of new and updated mobile apps analyzed over the previous year were classified as malicious or suspicious. That\u2019s nearly 10 million apps, up from a little more than two million such apps in 2015.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>Given the rising frequency of cyberattacks and data breaches year over year, it\u2019s no surprise that we\u2019ve continued to see more sophisticated smartphone attacks. Some of the most common mobile threats users face are mobile web browser-based hacking, adware, remote device hijacking and eavesdropping, and breaches of mobile payment services.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2>Why you need a mobile security app<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<p>To avoid becoming a hacker\u2019s next victim, protect your device with a <a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/mobile\">mobile security app<\/a>. A trusted security app can block infected or malicious apps and file downloads. It can also help protect your identity and personal information if your mobile device is lost or stolen.<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>It\u2019s worth pointing out that all mobile security services are not created equal. In October, independent testing firm AV-TEST found that Google\u2019s Play Protect service, which is designed to safeguard Android apps, was <a href=\"https:\/\/thenextweb.com\/google\/2017\/10\/24\/google-play-store-antivirus-fail\/\">found to be \u201csignificantly less reliable\u201d<\/a> than third-party security apps, according to The Next Web.<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\"><a href=\"http:\/\/wbrt.io\/3dde8\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-22339\" src=\"\/blog\/wp-content\/uploads\/2017\/09\/Dont-Get-Hacked_698x232.jpg\" alt=\"Don't Get Hacked\" width=\"698\" height=\"232\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2017\/09\/Dont-Get-Hacked_698x232.jpg 698w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2017\/09\/Dont-Get-Hacked_698x232-768x255.jpg 768w\" sizes=\"(max-width: 698px) 100vw, 698px\" \/><\/a><\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>Outside of a solid mobile security app, Webroot Chief Information Security Officer Gary Hayslip recommends making sure mobile devices are up to date:\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>\u201cI recommend getting in the habit of periodically checking for updates and, if any are available, installing them. Updates that are waiting to be installed are accidents waiting to happen; they are doorways that can be exploited to access your devices or steal or encrypt your information. Don&#8217;t make it easier for your device to be compromised, keep it updated with the latest patches.\u201d<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2>Safety measures<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<p>In addition to a mobile security app and frequent updates, you should also be protective of your mobile device\u2019s connections. Follow these two tips to double-down on your mobile safety:\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b>Turn off your Bluetooth<\/b>: Bluetooth is a resurgent way for cyber deviants to gain access to your devices and personal information, so be sure to keep your Bluetooth off while out and about doing holiday shopping.<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b>Data over <\/b><b>Wi<\/b><b>Fi<\/b><b>:<\/b> Public WiFi networks are notorious hotbeds for digital attacks. If you have to do your holiday shopping online in public, use your cellular connection instead. If you\u2019d rather not use data, a <a href=\"https:\/\/www.techhive.com\/article\/3158192\/privacy\/howand-whyyou-should-use-a-vpn-any-time-you-hop-on-the-internet.html\">virtual private network<\/a> (VPN) is a great way to protect yourself while connected to a public network on your mobile device.\u00a0<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>As the holiday season kicks into high gear, keep in mind that shoppers are at an even higher risk of cyberattacks during this time of year. Salesforce projects that mobile users will account for 60 percent of traffic to retail sites around the globe this year. With the increased popularity of shopping on the go, [&hellip;]<\/p>\n","protected":false},"author":111,"featured_media":22691,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[2985],"tags":[],"yst_prominent_words":[3775,5109,3565,3769,3615,5391,18225,5389,3557,4065,5385,5387,5379,5377,5383,4009,4331,3479,5381,5393],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/22687"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/111"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=22687"}],"version-history":[{"count":8,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/22687\/revisions"}],"predecessor-version":[{"id":23155,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/22687\/revisions\/23155"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/22691"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=22687"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=22687"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=22687"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=22687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}