黑料正能量

Spotlight

Can you be hacked while using your mobile device? In a word, yes 鈥 here鈥檚 how to protect your data

4 min. read


October is Cybersecurity Awareness Month and being aware of all your devices is as important as ever before. Most people are online every day, which opens themselves up to a threat of being hacked. Whether it be a mobile device, laptop, or personal computer, everyone needs to have cyber awareness.


director of the Cyber Institute at 黑料正能量鈥檚 School of Computer and Cyber Sciences said many straightforward things that can be done to protect devices, such as having lock screens, making sure operating systems are up to date and simply recognizing how, when and where devices are being used.


鈥淪mart phones today are probably the most capable computing device that we have and we have it on us all the time,鈥 said Weldon.



鈥淭he data that can be extracted from these devices can be put together to build a pattern of life on us: where we go, what we do and when we do it. All of this data is potentially at risk if we鈥檙e not being careful about who gets access to our smart phones. That鈥檚 a great reason to lock the screen and require at least a password or pin to unlock the phone.鈥


, PhD, assistant professor in the School of Computer and Cyber Sciences, suggests using biometrics to enhance security.


鈥淚 would strongly recommend for women, young adults even teenagers, if it鈥檚 possible for you to have biometrics as a way to unlock your device, then go for that. These unique ways of unlocking a device would add a layer of protection,鈥 said Dorai.



Dorai is one of the growing experts in the field of mobile forensics and her research projects are federally funded. In addition, several SCCS faculty are mentoring undergraduate and graduate students working on cutting edge research related to mobile device security and digital forensics.


She also suggested adding a two-factor authentication or multi-factor authentication to add an extra layer of security.


When out in the public, it鈥檚 easy to connect a mobile device to an unprotected Wi-Fi network. Doing so could open up sites you visit to a hacker. Weldon suggests people should be careful of what apps are used when on public Wi-Fi, since they may expose a lot of personally identifiable information. His suggestion is to use a virtual private network to help protect data that鈥檚 being transmitted and received.


鈥淲e should recognize the data on our smart phones and protect them accordingly,鈥 added Weldon. 鈥淩ecognizing the value and sensitivity of the data on our smart phones can guide us in how we protect these devices. We may not think as much about the security and privacy of our smart phones as we do about our laptops and desktops. When we think about everything we use our smartphones for, how ubiquitous they are in our lives, we come to realize just how central they are to today鈥檚 lifestyle in the digital age.鈥


It鈥檚 tough to identify when a mobile device has been hijacked, so both Weldon and Dorai suggest paying close attention to any unusual behavior, even small things such as a battery draining faster than usual. Both are indicators you may need to take corrective actions.



Dorai added the government can do more to protect a person鈥檚 privacy.


鈥淲ith the introduction of more and more Internet of Things devices in the market, with several different manufacturers, there鈥檚 a lot of user data that鈥檚 actually getting exchanged. These days, the most valuable thing in the world is data. So stricter measures are required,鈥 she said.


She indicated it needs to be a collaborative effort between industry, academia, government, and practitioners to come together and work on ideas to strengthen security.



鈥淵es we want security. We are willing to put up with a little bit of friction for additional security. We want it easy and we generally want it free,鈥 said Weldon. 鈥淲e don鈥檛 read licensing agreements, but we would generally be willing to take certain actions, make certain tradeoffs, to be more secure.鈥


One other major concern are apps in general. While Google Play Store and Apple routinely remove some apps that may be out of date or have security vulnerabilities, they may still be running on a user鈥檚 device.


鈥淢obile applications may also hide from you in plain sight in the sense the app icons may not be showing up on the screen, but still they are running in the background,鈥 added Dorai.




In essence, the device user is the first line of defense. Taking all the necessary steps to prevent a third party from getting your information is of the utmost importance in the digital age.


鈥淚 believe a big part of it this discussion is about user awareness. We want that free app but that app is asking for a lot of permissions. There鈥檚 an old saying in cybersecurity: if you are not paying for the product, you are the product. There鈥檚 also another saying: if it鈥檚 smart, it鈥檚 vulnerable,鈥 said Weldon.


Are you a reporter covering聽Cybersecurity Awareness Month? If so - then let us help with your stories.


is the聽Director of聽 Cyber Institute at the School of Computer and Cyber Sciences at 黑料正能量 and is an expert in the areas of聽cellular and mobile technology, ethics in computer science, scripting and scripting and automation.


is an Assistant Professor in the School of Computer and Cyber Sciences at 黑料正能量聽and is an expert in the areas is mobile/IoT forensics research.


Both experts are available for interviews - simply click on either icon to arrange a time today.

Connect with:

Gokila Dorai, PhD

Assistant Professor

Dr. Dorai鈥檚 area of expertise is mobile/IoT forensics research and developing a targeted data extraction system for digital forensics.

Jagwire is your source for news and stories from 黑料正能量. Daily updates highlight the many ways students, faculty, staff, researchers and clinicians "bring their A games" in classrooms and clinics on four campuses in Augusta and locations across the state of Georgia.