Tip of the Week: Spotting Potential Mobile Malware

July 29, 2020

Chances are, you not only have a smartphone, but that smartphone is also currently within arm’s reach. With these devices playing an increasingly important role in our personal and professional lives, these devices have proven to be a lucrative target for hackers to pursue. This week, our tip is meant to help you spot the warning signs that an application is hiding an attack.

Too Many Permissions

As careful as so many are with their data security, mobile applications can be a glaring blind spot. While access to certain files on the phone is required for certain applications to function, other applications should have no need for the data they request. Each application you use should have its requested permissions evaluated, and should one ask for too much, you need to reconsider using that app. This is also one of the reasons it is important to only source your applications from an established applications store—these app stores are vetted and regularly reviewed to catch malicious apps.

Battery Loss

Time for a basic physics lesson: the first law of thermodynamics states that the amount of energy in the universe is a set amount. This means that energy cannot be created nor destroyed, only converted to a different form. While the battery in your phone is an imperfect example of this, the theory stands: if you don’t use it much, the phone should remain charged. So, if your phone suddenly drops in battery life seemingly without explanation, that’s a bad sign.

Malware could be the explanation. Running in the background, some mobile malware will collect assorted data. To find out which applications are responsible, it helps to check how much power different applications consume in your battery settings.

Passwords Stop Working

So, you type in your password, just as you always do, and press the enter key. Incorrect password. Whoops, you must have hit two keys at once or something, so you type it again. Incorrect again. Again and again, you type your password, making sure it is perfect, only to have it kickback.

This is an almost sure sign that your account has been taken over and your credentials changed. Reclaim the account if you can and reset passwords for all your accounts using best practices. It may also be wise to restore your device entirely from a backup to wipe any malware that may have been lurking.

CTN Solutions can help your company manage its entire technology infrastructure, down to the mobile devices that we so commonly see. Learn more about what we can offer you by calling (610) 828- 5500.

Contact CTN

Office

610 Sentry Parkway

Suite 110

Blue Bell, Pennsylvania 19422

Call Us

(610) 828- 5500

12 + 2 =

Skip to content