How Mobile Devices Became the Bad Guys’ Favourite Weapon
Posted: Monday, Jan 20
  • KBI.Media
  • $
  • How Mobile Devices Became the Bad Guys’ Favourite Weapon
Karissa Breen, crowned a LinkedIn โ€˜Top Voice in Technologyโ€™, is more commonly known as KB. A serial Entrepreneur that Co-Founded the TMFE Group, a holding company and consortium of several businesses all relating to cybersecurity including, an industry-leading media platform, a marketing agency, a content production studio, and the executive headhunting firm, MercSec. KBI.Media is an independent and agnostic global cyber security media company led by KB at the helm of the journalism division. As a Cybersecurity Investigative Journalist, KB hosts her flagship podcast, KBKast, interviewing cybersecurity practitioners around the globe on security and the problems business executives face. It has been downloaded in 65 countries with more than 300K downloads globally, influencing billions in cyber budgets. KB asks hard questions and gets real answers from her guests, providing a unique, uncoloured position on the always evolving landscape of cybersecurity. As a Producer and Host of the streaming show, 2Fa.tv, she sits down with experts to demystify the world of cybersecurity and provide genuine insight to businesses executives on the downstream impacts cybersecurity advancement and events have on our wider world.

i 3 Table of Contents

How Mobile Devices Became the Bad Guys’ Favourite Weapon

Everyone is glued to their mobile devices, sinister cyber threats lurk beneath those sleek screens, waiting to exploit our casual scrolling and innocent application installations. According to Jeff Lindholm, Chief Revenue Officer at Lookout Technologies, our beloved smartphones and tablets are digital best friends – but most are unware their risks that lie behind the blue light screens.

The reality that many security experts may prefer to sweep under the rug.

"The mobile edge is probably the most popular and growing attack vector for bad guys, more so than maybe any other edge device," he warned, sounding the alarm on a pervasive yet underestimated danger.

Rewinding to the genesis of mobile technology, Lindholm recalled a time when cellular phones were voice devices, completely detached from our โ€˜digital societyโ€™.

Fast forward a decade, and they have morphed into essential connectors of personal and corporate data – a metamorphosis dam for hackers to exploit.

"When security for mobile devices began, it was all about protecting the consumer, preventing personal data theft and bank account breaches. But now, they've been weaponised as gateways into the very heart of enterprises."

While many organisations have fortified their laptops and desktops, their mobile devices remain under protected. Phishing attempts, now more likely to target your phone than your laptop, people are spending more than ever on their devices.

How many of us casually download apps, oblivious to the possible malware lurking within?

"There are probably a lot of people who have malware on their phones and don't know about it," Lindholm said.

Lookout's telemetry tracks a quarter-billion devices and 350 million mobile apps. Your mobile device could be a double agent, working for you by day, feeding sensitive information to cyber criminals by night.

"If you're in the security realm and you havenโ€™t embraced the mobile edge as a place to build security for and around, it's time to rethink your strategy." Added Lindholm.

The emergence and the reliance on gig economy contractors and BYOD (Bring Your Own Device) policies, in turn complicates the task of securing mobile devices. Still, Lindholm insists it's achievable.

As youโ€™re likely reading this on your smartphone, consider the potential invisible risks you're harbouring. The battlefield has shifted, and our handheld devices are the new frontline. The overlooked mobile security complacency is over.

Share This