Page 45 - the SyI Quarterly 10
P. 45

Cyber  Updates











 Top Mobile Security Threats   AI will become essential to some businesses  interception technology. This technology can


 Expected In 2022  In combating cybercrime, cybersecurity     collect information about terrorist or criminal

                                                              activity when used lawfully. However, there is
         systems should consist of two capabilities: first,
                                                              a significant increase in this type of technology
         understanding the type and behaviour of cyber
 By Nicolle Allen at Salt Communications  threats, and second, figuring out how to block   being made available for unlawful reasons. The
         them.                                                use of unencrypted mobile messaging apps
 Misinformation campaigns, supply chain attacks,   to deceive consumers into clicking on harmful   However, the increasing complexity of cyber   to communicate information leaves business
 phishing, smishing, mobile interception and   links and disclosing personal information. In the   threats such as zero-day malware, trojans,   and government employees open to attack
 mobile malware dominate mobile security   first six months of 2021, mobile smishing rose by   and ransomware necessitates a solution that   by providing a bad actor with an inexpensive
 trends worldwide businesses and government   over 700%, possibly as a result of online shopping   goes beyond human intelligence. To this end,   entry point and easy method to intercept and
 organisations are battling daily.  increasing due to the COVID-19 pandemic.   Artificial Intelligence (AI) has proven to be highly   collect transactional information or top-secret
         effective in mitigating its effects by using machine   government communications. Where hackers

 The hazards of compromised mobile security   The rise of Mobile Malware attacks   learning, deep learning, and other cutting-  have intercepted M&A communications to gain
 vulnerabilities are waiting around the corner, with   2021 witnessed a significant increase in malware   edge approaches to replicate human precision   access to sensitive information to manipulate the
 the most prominent businesses and governments   attacks, with hackers focusing their efforts   in cyber-attack detection on a broader scale.   stock market for financial gain, or a government
 feeling the heat of cyber attacks and mobile   on smartphones using techniques such as   AI tools have become critical components for   employee has discussed sensitive information via
 threats due to the increased use of mobile phones   surveillance, credential theft, and harmful adverts.   accurately detecting future dangers and delivering   insecure mobile platforms, is a decision that could
 for work purposes.  In fact, according to a prominent digital journal,   appropriate responses to avoid business   put themselves and the wider public in danger
 cyberattacks on mobile devices increased by   disruption with companies investing millions of   should the information fall into the wrong hands.
 Due to the ever-increasing number of cyber   50% in the first half of 2021 compared to the   dollars in detecting threats and preventing attacks.
 incidents in 2021, leading business and security   same period the previous year. Publications   This is why many businesses and governments
 specialists are encouraging corporate leaders to   and prominent analysts suggest the number of   Malvertising and eavesdropping will increase   choose to use a secure communications platform
 spend significantly on Mobile Threat Defense. Due   malware attacks has risen due to the increased   with easy SSL certificates  to interact both internally and externally.
 to the apparent complex nature of security threats   use of banking apps’ providing hackers with   Most of us rely on a website with a padlock icon   The Salt Communications solution enables
 and attacks, as well as the obscurity of typical   a means to steal payment data, misuse login   in the URL bar, which merely indicates that it is   professionals to conduct secure calls and send
 detection techniques, today’s mobile security risks   credentials, and remove funds from victims’ bank   a secure website to access. However, as more   secure messages while maintaining complete
 have more than doubled in recent years.    accounts.  businesses use this method to demonstrate their   communication privacy. Salt allows organisations
         security, hackers seize the opportunity to obtain    to control their own communications, mitigating
 Growth of Phishing and Smishing attacks   Attempts to seize connected devices will   an SSL certificate while remaining undetected.   many of the risks other businesses encounter
 This year mobile phishing assaults are expected   increase  The biggest threat is through payment gateways   when sharing important information via their
 to increase in sophistication and effectiveness by   Kaspersky discovered that infected devices are   on a mobile, and with a lack of a strong SSL   mobile device.  All of these mobile security trends
 tempting users to click on malicious web links,   being used to steal personal or business data and   certificate on apps, many fall foul. Yet obtaining   point to the increasing need for more stringent
 open infected files, and download malware from   mine cryptocurrency, in addition to classic DDoS   an SSL certificate is relatively simple, with issuers   and comprehensive mobility policies. Indeed, if
 email attachments or even SMS. Following the   operations in which the devices are added to a   offering the service free of charge or at a low   forecasts are correct, new industry-specific and
 dangers of uncontrolled WiFi connections, phishing  botnet. In addition to weak passwords providing a   cost to prevent payments from being monitored   universal data privacy regulations and governance
 attacks have risen to second place of the most   mechanism to hack IoT targets, a growing number   or Personally Identifiable Information (PII) being   will be enacted in 2022, with a particular
 prevalent network hazards for mobile devices.   of vulnerabilities are being discovered, making   obtained. For attackers, digital certificates   application dedicated to mobility to carefully
 Phishing is a fraudulent attempt by cybercriminals   IoT devices more appealing to attackers. It is   are beneficial because they allow them to get   monitor the pattern of mobile usage by far and
 to steal sensitive personal information such   also expected that the number of IoT-connected   beyond ever-improving defence systems, with   wide.
 as credit card details and login credentials by   devices will increase by 17% over the next seven   these attacks projected to remain popular for
 impersonating a legitimate company or individual   years. Furthermore, the risk is increasing with   the foreseeable future. An easy SSL certificate   To discuss this article in greater detail with
 in an email conversation.  several home-based products, heaters, locking   prevents the user from having any armour to stop   the team, or to sign up for a free trial of
 systems, electric switches, automobiles, and   their mobile from being compromised.   Salt Communications contact us on info@
 Smishing has been around for a long time, and due  security cameras, which may now be controlled   saltcommunications.com or visit our website at
 in part, to the global pandemic, it has increased in   remotely from a mobile device via a single   The growing popularity of Mobile   https://saltcommunications.com/.
 popularity, as indicated by Google News. Smishing   smartphone app.  Interception
 is a global problem that leads to massive financial   The storage, recording, tracking, and interception
 losses, invasions of privacy, and growing enterprise   of cellular communications such as phone calls,
 damages. Smishing scammers send text messages   internet usage, SMS, and so on is known as mobile


 44
   40   41   42   43   44   45   46   47   48   49   50