Page 73 - index
P. 73
First, recognize that mobile devices are the new primary target. Be alert. Be cautious. If you
receive an email with a link in it that you don't recognize, don't click on it. Doesn't matter if it is
your laptop or your iPhone. Seriously, don't do it.
Second, keep your virus protection up-to-date on your computers even though it may be
annoying to purchase annual licenses and we are all a little suspicious of the virus protection
vendors. But, in the likelihood that you need to connect to your computer with your mobile
devices, you don't want to leave an open door for criminals to infect your devices from your
laptop.
Third, recognize that juice-jacking is the number one opportunity for mobile device infections -
so, when you plug your phone into any USB port, you are extremely vulnerable to attacks.
Read up on the recent WireLurker juice-jacking virus and your knees will rattle a bit. You are
especially vulnerable while on travel - when you often have no choice but to charge through a
USB port and have no way of knowing what
you are plugging into. ChargeDefense’s
product, the Juice-Jack Defender® is
guaranteed to block identity theft code and
malware when connected to a USB outlet. It's
95
a $15. no-brainer. If you don't have a Juice-
Jack Defender® and must connect to an
unknown USB port, at least keep your mobile device locked. And for goodness sake, put a
password on your device! But, even those precautions are no guarantee that a hacker can't find
a way in.
The bottom line is this: Don't be naïve. YOU ARE THE TARGET OF CYBER CRIMINALS. Be
smart. Protect yourself. Use common sense precautions. And, remember that it isn't just
computers anymore. That wonderful mobile device that you carry around with you everywhere
needs the same level of protection and precaution as your laptop computer. Be safe.
About the Author
Stuart McCafferty, ChargeDefense
Like us on FaceBook and get special discount deals: www.facebook.com/chargedefense
73 Cyber Warnings E-Magazine – December 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide