Select Page

On the internet, there have always been some security concerns. Actually being online is somehow exposing your machine, sensitive data that you stored on, and the interactions you have with the network to multiple threatening and indeed dangerous attacks. Let’s cite viruses and Trojans as examples. With the mobile technology revolution, accessing the internet has become available to everyone and moreover, it is a daily routine like you are 24/7 online. Are the security concerns still there and if they are, have they kept the same level of consistency?

Summarizing the regular security concerns:

The basic security concerns are first described for the classical internet, which uses desktops and laptops. Users were, and they still, worried about the hard drives where they store their data. The files they have created and the media they have captured are all saved there. They also have access to their online accounts (drives, inboxes…) through the windows of their browsers.  Cybercriminals use small worms to operate a breach in the shield and then can launch Trojans and viruses. The most important concern is that there are some software that are vulnerable because they require sessions that last for a long time (streaming application, live communication applications…).

The security concerns of the mobile technology:

The mobile technology uses devices that are connected to the internet and that interact with the telecommunication networks. Besides, mobile devices (smartphones and tablets) are not as securable as desktops and laptops. The reason is that these devices can’t be upgraded easily and the security updates they may receive are very futile and, very soon, the device will be declared outdated and the applications will no longer be supported. Moreover, it is hard to monitor WiFi connections. This hard to secure protocol creates one of the greatest opportunity to infiltrate the device and nest a malicious script. There is a way of hijacking the mobile device by using the unsecured WiFi network which called the man-in-the-middle. That technique allows the hijacker to spy all communications and steal sensitive information.

The implications of the mobile technology:

The mobile technology has therefore introduced new threats and has arisen new concerns. All the aspects of the daily life are nowadays done with the mobile devices. The communications, the short messages have also become exposed to theft since they are stored on the device, and the malicious script can access them easily. The logged sessions last as long as the device is put on and this, indeed, is the biggest concern. We are exposed at any time and all the time.

Besides, there are some vulnerabilities which can be described as hard-coded; they are some built-in weaknesses that require the users to switch from one device to another very quick. The ability to secure oneself while being on a mobile network has become the hardest thing on earth.

Conclusion:

The security concerns have increased with the continuous development of the mobile devices. The ability to access the web from the palm of the hand has, definitely its price. Besides, the upgrades usually performed on the operating systems and, evenly, on the hardware components, are no longer as effective as they were on the desktops and laptops. At least, they were conceivable by a freelance web designer Singapore.