Mobile security


Most of us who have access to the internet also have smartphones which is often the immediate device of choice, that we use access our emails and social networks.

They can be used whilst travelling, when in a traffic queue, and even in bed. Whether this is healthy way to communicate is another issue, and I have written about some of the major disadvantages of this behaviour in previous columns. But we need to accept that this is fast becoming the norm – especially with the younger generation.

Ensuing that we access the internet via these devices in a secure way is essential. Whilst there have only thus far been a few cases of mobile viruses, this is likely to increase exponentially, especially with the advent of mobile money and internet banking functionality offered on mobiles.


Criminals are now targeting such usage, especially via phone to phone infections – as it is now a lucrative target for them.

How can we ensure we are safe from such attacks on a daily basis? It pays to check on the following points. First and foremost, be aware that thus far there are no reported phone to phone virus auto instals. The user must carry out an action to allow the virus to instal.

This usually takes the form of clicking on an attachment purportedly sent by a friend via MMS, Skype or Bluetooth. Opening the message itself is not dangerous. But always verify with the sender if required, before clicking on an unsolicited attachment.


I choose usually to delete these immediately, and send the user a message asking them to confirm – and if necessary re-send the attachment. Even I had the misfortune of being infected last year with a virus that attacked my Skype account and sent message to everyone in my address book.

Getting rid of it was a nightmare. It appeared in the form of an invoice sent by one of my existing suppliers – which in itself seemed innocent enough. I did not wonder why they had started sending invoices by Skype rather than email? So, if in doubt, do not click before verifying.

Ensure your phones operating system is as up to date as possible. Most smartphones allow the option of automatically updating. Once a responsible phone manufacturer identifies malware targeting their phones, they rush to provide a patch to protect all phones as soon as possible.

It also pays to download and use one of the free mobile anti virus packages available online. Kaspersky even offers an add in with their corporate solution packages to protect company users who seek to access the company network.

Once downloaded, keep them up to date and scan regularly, especially if you are in the habit of downloading apps and files onto your mobile. Make sure you check your files and folders regularly.

Did you know that anyone sending pictures or videos via Whatsapp for example, will result in these files being downloaded to your phone before you can view them properly?

Avoid keeping your Bluetooth on by default. Apart from saving on your battery power, this is a widely used way of accessing mobile phones illegally. Likewise – be careful of using free wireless networks in public places.

Whilst not many of them exist in Malawi (yet?), travelling users who utilise these in cafes and airports have been compromised.

Finally, ensure that your smartphone is protected with a strong secure password – and if your sim card allows this, do the same here. I am amazed at the number of friend’s smartphones that they have left behind – that when switched on – give full access to their social networks, email accounts and online accounts, as they are permanently logged in!

Think very hard on what information that is on your phone that you are prepared to share with a total stranger, if the phone is stolen or misplaced.

The more you use your mobile phone on a daily basis, the more vulnerable you become to malicious use of your personal data. Take the right steps now to make sure you are not another victim.

Facebook Notice for EU! You need to login to view and post FB Comments!
Show More

Related Articles

Back to top button

Adblock Detected

Please consider supporting us by disabling your ad blocker