{"id":8666,"date":"2018-05-18T14:38:31","date_gmt":"2018-05-18T19:38:31","guid":{"rendered":"https:\/\/hml.iticollege.edu\/?p=8666"},"modified":"2018-05-18T14:38:31","modified_gmt":"2018-05-18T19:38:31","slug":"mobile-security-threats-2018","status":"publish","type":"post","link":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/","title":{"rendered":"Mobile Security Threats to Watch out in 2018"},"content":{"rendered":"<p>Mobile security is very important today, as you probably know already. If you are planning to obtain an information security degree, then it will be crucial for you to learn more about the potential mobile threats that may be plaguing the industry today. You will learn about these extensively as you are earning your <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/our-programs\/information-technology\/\">information security degree<\/a>. As you move forward in the industry you will quickly learn just how much of an effect these threats can have on the organization that you are working for.<\/p>\n<h2>Untrustworthy Mobile Devices Present a Serious Threat<\/h2>\n<p>Once you step into your position as an <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/help-protect-the-future-with-an-information-security-degree\/\">information technology security officer<\/a>, you will quickly learn that unknown devices cannot be allowed onto your network without the proper precautions. A tablet, a cell phone, or even a laptop can be easily configured maliciously to compromise the security that you have worked around the clock to secure. Infected Android devices are quite common, and it has been found repeatedly that the user themselves did not commit the malicious act, but rather that the phone committed malicious actions based on the software that was installed previously. The theory is that somewhere along the line, malicious software was added through the supply chain.<\/p>\n<h2>Malicious Applications \u2013 Right on Google Play<\/h2>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignright wp-image-6024\" src=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/12\/Itsupport2-1.jpeg\" alt=\"Datacenter manager\" width=\"442\" height=\"295\" \/>In your <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/information-security-training\/\">information security classes<\/a>, you will learn that Google Play is sometimes too loose with its acceptance policies for new applications. There have been more than a few malware applications found on Google Play, all of which are designed to perform a different function. Most often, the malware is designed to generate large amounts of clicks on advertisements which generates revenue for those controlling the software. Surprisingly, this simple act can generate millions of dollars and while highly illegal, it is considered to be highly successful.<\/p>\n<p>With one simple piece of software, these malicious hackers are able to employ millions of phones into doing the heavy lifting for them. It\u2019s a shady practice, but effective, and it seems that it is affecting more than just the Android market. The iOS market has seen its share of infections as well, and it\u2019s not going in a great direction. Fortunately, we are seeing more individuals jumping into the <a href=\"https:\/\/www.computerweekly.com\/news\/252442829\/Industry-must-do-more-to-open-up-cyber-security-profession\" target=\"_blank\" rel=\"noopener\">information security industry<\/a> to help alleviate some of the stress and address some of the malware issues.<\/p>\n<h2>Apps with Information Leakage<\/h2>\n<p>There are some apps that appear to be useful but they have in fact been shown to have information leakage. Information leakage means these apps participate in the misappropriation of information, which can include extracting contacts from a phone\u2019s directory. This information can be used by telemarketers or scammers to exploit money from the owner of the phone number.<\/p>\n<h2>Ransomware \u2013 An Emerging Threat<\/h2>\n<p>Ransomware is something that has popped up in the last ten years or so, and it has unfortunately caused problems for thousands, even tens of thousands of individuals. It is a popular type of malware that infects a PC, encrypts the files within, and then demands that the user pay a large sum of money to unlock the files in question.<\/p>\n<p>Mobile devices can be subject to any number of different threats and as an IT professional specializing in security, it will be your job to make sure that all devices entering your network are properly secured and that they pass rigorous testing again and again. It can be tiring, but it will save you and your company a lot of trouble.<\/p>\n<p><a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/what-is-information-technology-security\/\">Information technology security<\/a> is quickly becoming more important and if you want to take part in this field, then it\u2019s time for you to review our admissions policy and take advantage of <strong>ITI Technical College<\/strong>\u2019s substantial knowledge base. The future is waiting \u2013 will you be a part of solving the latest problems and addressing the latest threats?<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Disclosure:<\/strong><\/p>\n<p class=\"western\"><strong>For more information about graduation rates, the median debt of students who completed the program, and other important information, please visit our website:\u00a0<\/strong><a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/disclosures\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/impactwindowswholesaler.com\/iticollege\/disclosures\/<\/a><\/p>\n<p class=\"western\">\n","protected":false},"excerpt":{"rendered":"<p>Mobile security is very important today, as you probably know already. If you are planning to obtain an information security [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[21],"tags":[92,93,96,97,98,99,100],"class_list":["post-8666","post","type-post","status-publish","format-standard","hentry","category-news","tag-computer-information-security-technology-training","tag-define-information-technology-security","tag-information-technology-credits","tag-information-technology-homeland-security","tag-information-technology-security-careers","tag-information-technology-security-certification","tag-information-technology-security-officer"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mobile Security Threats to watch out in 2018 | ITI Technical College<\/title>\n<meta name=\"description\" content=\"Mobile Security Threats to Watch out in 2018. Click here to read more about these new mobile security threats and call us today!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Security Threats to watch out in 2018 | ITI Technical College\" \/>\n<meta property=\"og:description\" content=\"Mobile Security Threats to Watch out in 2018. Click here to read more about these new mobile security threats and call us today!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/\" \/>\n<meta property=\"og:site_name\" content=\"ITI College\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-18T19:38:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/12\/Itsupport2-1.jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\"},\"headline\":\"Mobile Security Threats to Watch out in 2018\",\"datePublished\":\"2018-05-18T19:38:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/\"},\"wordCount\":671,\"image\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/12\/Itsupport2-1.jpeg\",\"keywords\":[\"Computer &amp; Information security Technology Training\",\"define information technology security\",\"information technology credits\",\"information technology homeland security\",\"information technology security careers\",\"information technology security certification\",\"information technology security officer\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/\",\"name\":\"Mobile Security Threats to watch out in 2018 | ITI Technical College\",\"isPartOf\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/12\/Itsupport2-1.jpeg\",\"datePublished\":\"2018-05-18T19:38:31+00:00\",\"author\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\"},\"description\":\"Mobile Security Threats to Watch out in 2018. Click here to read more about these new mobile security threats and call us today!\",\"breadcrumb\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/#primaryimage\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/12\/Itsupport2-1-scaled.jpeg\",\"contentUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/12\/Itsupport2-1-scaled.jpeg\",\"width\":2560,\"height\":1709},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security Threats to Watch out in 2018\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#website\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/\",\"name\":\"ITI College\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/impactwindowswholesaler.com\/iticollege\"],\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobile Security Threats to watch out in 2018 | ITI Technical College","description":"Mobile Security Threats to Watch out in 2018. Click here to read more about these new mobile security threats and call us today!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/","og_locale":"en_US","og_type":"article","og_title":"Mobile Security Threats to watch out in 2018 | ITI Technical College","og_description":"Mobile Security Threats to Watch out in 2018. Click here to read more about these new mobile security threats and call us today!","og_url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/","og_site_name":"ITI College","article_published_time":"2018-05-18T19:38:31+00:00","og_image":[{"url":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/12\/Itsupport2-1.jpeg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/#article","isPartOf":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/"},"author":{"name":"admin","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112"},"headline":"Mobile Security Threats to Watch out in 2018","datePublished":"2018-05-18T19:38:31+00:00","mainEntityOfPage":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/"},"wordCount":671,"image":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/#primaryimage"},"thumbnailUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/12\/Itsupport2-1.jpeg","keywords":["Computer &amp; Information security Technology Training","define information technology security","information technology credits","information technology homeland security","information technology security careers","information technology security certification","information technology security officer"],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/","name":"Mobile Security Threats to watch out in 2018 | ITI Technical College","isPartOf":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#website"},"primaryImageOfPage":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/#primaryimage"},"image":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/#primaryimage"},"thumbnailUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/12\/Itsupport2-1.jpeg","datePublished":"2018-05-18T19:38:31+00:00","author":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112"},"description":"Mobile Security Threats to Watch out in 2018. Click here to read more about these new mobile security threats and call us today!","breadcrumb":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/#primaryimage","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/12\/Itsupport2-1-scaled.jpeg","contentUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/12\/Itsupport2-1-scaled.jpeg","width":2560,"height":1709},{"@type":"BreadcrumbList","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/mobile-security-threats-2018\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/impactwindowswholesaler.com\/iticollege\/"},{"@type":"ListItem","position":2,"name":"Mobile Security Threats to Watch out in 2018"}]},{"@type":"WebSite","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#website","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/","name":"ITI College","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/impactwindowswholesaler.com\/iticollege\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/impactwindowswholesaler.com\/iticollege"],"url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts\/8666","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/comments?post=8666"}],"version-history":[{"count":0,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts\/8666\/revisions"}],"wp:attachment":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/media?parent=8666"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/categories?post=8666"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/tags?post=8666"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}