• CERTIFICATE
    • Eminent VARs of India
    • Best OEM 2023
  • SYNDICATION
    • AMD
    • DELL TECHNOLOGIES
    • HITACHI
    • LOGMEIN
    • MICROSOFT
    • RIVERBED
    • STORAGECRAFT
    • THALES
  • EVENTS
  • GO DIGITAL
  • INFOGRAPHICS
  • PRESS
    • Press Release PR News Wire
    • Press Release Business Wire
    • GlobeNewsWire
  • SPECIAL
    • WHITE PAPER
    • TECHNOMANIA
    • SME
    • SMART CITY
    • SERVICES
    • EDITOR SPEAK
    • CSR INITIATIVES
    • CHANNEL GURU
    • CHANNEL CHIEF
    • CASE STUDY
  • TECHTREND
    • VAR PANCHAYAT
    • TELECOM
    • SOFTWARE
    • POWER
    • PERIPHERALS
    • NETWORKING
    • LTE
    • CHANNEL BUZZ
    • ASK AN EXPERT
  • SUBSCRIBE
  • Apps
  • Gaming
  • KDS
  • Security
  • Telecom
  • WFH
  • Subscriber to Newsletter
  • April Issue
  • Blogs
  • Vlogs
  • Faceoff AI
    

HOME
NEWS

Beware! Apps on Your Smartphones are Highly Prone to Threats


By VARINDIA - 2017-02-28
Beware! Apps on Your Smartphones are Highly Prone to Threats

 

 

 

Although, economists and policy makers have mixed opinions about the recent move of the Centre Government, but there is no doubt that Demonetization has caused the biggest cash crunch in India. To fight with this crisis, people have no other option except e-wallet; the gift of Cashless or better to say Digital Economy. Once again people are divided over the sudden introduction of the cashless monetary concept and both groups have logical assertions. Forecasting the long-term repercussions is not a point of discussion, what relevant here is making people aware of security challenges of e-wallets in the Cashless Economy. Because evil eyes are constantly stalking and prying on people’s computers and smartphones, Application-Specific Attacks records for 19% of cyber attacks in the year 2016 and mobile threats are all time high. With the shortage of cash and promotion of a cashless economy in the country, it is obvious that IT miscreants will look towards a way of breaking cyber security for their interest. 

 

An Alarming Situation

 

Today, a large number of people are using the online platform in the country for payments and money transactions either through online banking or e-wallets available on their smartphones. But, did you know that less than 5% of the mobile phone companies are using software which can detect potential security threats? Viruses, Trojans, Ransomware, Spyware and Malware are the potent weapons of hackers that they deploy to steal the data stored in internet phone and they also try to intercept a transaction process. Whatever be the value of a transaction, they make rigorous efforts to plunder the digital currency of individuals and businesses. World’s most tech-savvy country, the US lost $5.4 million to Bitcoin data breach in 2015. In contrast, when a majority of Indian population is not well versed with digital transactions and e-wallets, mobile security is a big challenge. 

 

After the implementation of demonetization policy in the country, a number of e-wallet transactions jumped up by 271 percent, the point of sale terminals have increased by 95 percent, a hike of 316 percent is noted in RuPay transactions whereas a growth of 119 percent was noticed in the unified payment interface. These threats come from the apps that customers download on a regular basis. Ironically, when we talk about cyber security, we seldom include mobile security. In fact, mobile data theft poses a bigger risk of leaking your information as your emails, contacts and other social networking sites are already installed in it. All our private and official information is at high risk while it is stored on our personal mobile phone.

 

Treat Symptoms that Should Never Be Ignored

 

If your smartphone’s battery has suddenly frustrated you with poor backup and you are frequently facing call drop problems, be alert, it could be a potential threat. Besides these two issues, if you are receiving large mobile bills without any visible change in your consumption pattern and you often face problems while downloading or uploading a document using the mobile data. Then beware! Your phone is either infected or hacked. So, be smart to intercept a data breach before it harms your personal and valuable information because mobile threats are on the rise.

 

Precaution, Prevention, and Protection

 

As we all know that precaution is better than cure, delete all the redundant apps from your phone and avoid downloading the apps which are not very useful to you. Don’t ignore any invasive permission, scrutinise it and block it. Before clicking “accept” for an update, make sure it is not a hacking attempt. In the case of suspicious performance of a particular app, delete it and go for “factory reset”. Despite making all such efforts, if your smartphone is still making trouble then purchase a highly rated security app from Google Play Store, install it and run it to protect your phone from the virus, malware and other threats. 

 

Mr. Sanjay Sharma
MD, Cloudatix

See What’s Next in Tech With the Fast Forward Newsletter

SECURITY
View All
Zscaler announces AI innovations to its Data Protection Platform
Technology

Zscaler announces AI innovations to its Data Protection Platform

by VARINDIA 2024-05-20
SHIELD to enhance Swiggy’s fraud prevention and detection capabilities
Technology

SHIELD to enhance Swiggy’s fraud prevention and detection capabilities

by VARINDIA 2024-05-20
Axis Communications announces its first thermometric camera designed for Zone/Division 2
Technology

Axis Communications announces its first thermometric camera designed for Zone/Division 2

by VARINDIA 2024-05-20
SOFTWARE
View All
Hitachi Vantara and Veeam announce Global Strategic Alliance
Technology

Hitachi Vantara and Veeam announce Global Strategic Alliance

by VARINDIA 2024-05-16
Adobe launches Acrobat AI Assistant for the Enterprise
Technology

Adobe launches Acrobat AI Assistant for the Enterprise

by VARINDIA 2024-05-11
Oracle Database 23ai offers the power of AI to Enterprise Data and Applications
Technology

Oracle Database 23ai offers the power of AI to Enterprise Data and Applications

by VARINDIA 2024-05-10
START - UP
View All
Data Subject Access Request is an integrated module within ID-REDACT®
Technology

Data Subject Access Request is an integrated module within ID-REDACT®

by VARINDIA 2024-04-30
SiMa.ai Secures $70M Funds from Maverick Capital
Technology

SiMa.ai Secures $70M Funds from Maverick Capital

by VARINDIA 2024-04-05
Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure
Technology

Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure

by VARINDIA 2024-02-08

Tweets From @varindiamag

Nothing to see here - yet

When they Tweet, their Tweets will show up here.

CIO - SPEAK
Automation has the potential to greatly improve efficiency and production

Automation has the potential to greatly improve efficiency and production

by VARINDIA
Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

by VARINDIA
Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

by VARINDIA
Start-Up and Unicorn Ecosystem
GoDaddy harnesses AI power for new domain name recommendations

GoDaddy harnesses AI power for new domain name recommendations

by VARINDIA
UAE’s du Telecom selects STL as a strategic fibre partner

UAE’s du Telecom selects STL as a strategic fibre partner

by VARINDIA
JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

by VARINDIA
Rapyder partners with AWS to accelerate Generative AI led innovation

Rapyder partners with AWS to accelerate Generative AI led innovation

by VARINDIA
ManageEngine integrates its SIEM solution with Constella Intelligence

ManageEngine integrates its SIEM solution with Constella Intelligence

by VARINDIA
Elastic replaces traditional SIEM game with AI-driven security analytics

Elastic replaces traditional SIEM game with AI-driven security analytics

by VARINDIA
Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

by VARINDIA
Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

by VARINDIA
Dassault Systèmes to accelerate EV charging infrastructure development in India

Dassault Systèmes to accelerate EV charging infrastructure development in India

by VARINDIA
Tech Mahindra and Atento to deliver GenAI powered business transformation services

Tech Mahindra and Atento to deliver GenAI powered business transformation services

by VARINDIA
×

Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.

  • Distributors & VADs
  • Industry Associations
  • Telco's in India
  • Indian Global Leaders
  • Edit Calendar
  • About Us
  • Advertise Us
  • Contact Us
  • Disclaimer
  • Privacy Statement
  • Sitemap

Copyright varindia.com @1999-2024 - All rights reserved.