SlideShare une entreprise Scribd logo
1  sur  22
Télécharger pour lire hors ligne
MOBILE SECURITY AT
THE WORLD CUP
HEADING TO THE
WORLD CUP IN
BRAZIL?

CHANCES ARE
YOU’LL END UP IN A
CROWD OR TWO
PhotobyFlickruserRonnieMacdonald
THERE IS A LOT
GOING ON.
!
Protecting your phone and all of the data on it may be the
last thing on your mind, but taking a minute to think about
mobile security can save a lot of heartache later on.

ALL IT TAKES IS A LITTLE
COMMON SENSE, CAUTION
AND THESE TIPS:

STAY NATIVE
When you go to a new country, you probably don’t know
much about the app ecosystem, which could expose you
to threats you’re not even aware of.
TIP:
Make sure your device settings reflect your native or
regular IP address. The Google Play Store should be
available to your device as normal in Brazil, so keep using
the store as it will be subject to Google's usual scrutiny. 


DON’T DOWNLOAD
ON THE FLY
A quick “unofficial World Cup app” download may mean
downloading something scammy, especially if you don’t
have time to read through permissions.
TIP:
Use trusted markets like Google Play and the Apple app store when
downloading apps. Review all apps you download and consult the
official World Cup app list before clicking.
!
Make sure the Android system setting 'Unknown sources' is
unchecked to prevent dropped or drive-by-download app installs. 

AVOID USING PUBLIC WI-FI

Your phone’s 3G or 4G data connection is probably more secure than
the Wi-Fi networks that thousands of people are using. Stick to a
secure connection, especially if you’ll be logging into accounts,
making purchases or entering any private information about yourself.
TIP:
Turn off Wi-Fi connectivity in your phone’s settings
unless you’re confident in network security.

WATCH YOUR MOBILE WALLET
$
 You may come across Near Field Communication (NFC) mobile
payment stations around the World Cup to avoid having to
worry about carrying cash, but be cautious. 
TIP:
Turn on NFC signals only when necessary so the personal
information stored in your phone doesn’t fall into the wrong hands.
You can turn NFC on and off from your phone’s settings.

WATCH OUT FOR PHISHING

Does that email promising free tickets to the hottest games seem too good to
be true? It probably is. Phishing scams use email, text messages, Facebook,
and Twitter to send you links to websites that are designed to trick you into
providing information like passwords or account numbers. These messages
and sites are often very difficult to distinguish from legitimate sources.
TIP:
Do not click on links or open attachments in email messages
unless you can verify who sent them and what they sent.

KEEP YOUR EYE ON THE BALL…
ER…PHONE

From installing malware to taking the device itself, you never know
what might happen to your phone when you’re not watching it closely.
TIP:
Never leave your device unattended. It only takes a
moment for something bad to happen.

SET A PASSCODE
****
If somebody other than yourself does end up with your phone, a
password is the first line of defense for your personal data.
Read
the
blog
TIP:
To keep your information private, create a strong passcode
(read: not 1234 or 0000) for your phone and set your
screen to auto-lock within five minutes.

Read
the
blog
BE ABLE TO FIND YOUR SMARTPHONE
 IF IT’S LOST OR STOLEN

You’re depending on your mobile phone for so much, including
maps to get around, a credit card via NFC, a news feed and
social communications. It may even hold your ticket back home.
It would be a big problem if your phone is lost or stolen. 
TIP:
Install the Lookout app as a layer of insurance for phone
loss. You’ll be able to locate your lost phone and even lock
and wipe it if you want to protect your sensitive data.

For more mobile security tips, follow
  

Contenu connexe

Tendances

Mobile security
Mobile securityMobile security
Mobile security
home
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
Kevin Lee
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
cdunk12
 

Tendances (20)

How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhone
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
5 Types of Shady Apps
5 Types of Shady Apps5 Types of Shady Apps
5 Types of Shady Apps
 
Mobile security
Mobile securityMobile security
Mobile security
 
Trojan horseofbyod2
Trojan horseofbyod2Trojan horseofbyod2
Trojan horseofbyod2
 
How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsInternet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Mobile security - Intense overview
Mobile security - Intense overviewMobile security - Intense overview
Mobile security - Intense overview
 
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeMobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the Code
 
pegasus spyware
pegasus spywarepegasus spyware
pegasus spyware
 
News Bytes - June 2015 - Null HYD
News Bytes - June 2015 - Null HYDNews Bytes - June 2015 - Null HYD
News Bytes - June 2015 - Null HYD
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
 
Kaspersky 2017 Thailand Launch
Kaspersky 2017 Thailand LaunchKaspersky 2017 Thailand Launch
Kaspersky 2017 Thailand Launch
 

Similaire à Mobile Security at the World Cup

Your smartphone can help protect itself – and
Your smartphone can help protect itself – andYour smartphone can help protect itself – and
Your smartphone can help protect itself – and
RandyBett
 

Similaire à Mobile Security at the World Cup (20)

Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the Olympics
 
Smartphone apps
Smartphone appsSmartphone apps
Smartphone apps
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for android
 
Mobile security
Mobile security Mobile security
Mobile security
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
 
Imei tracker software
Imei tracker softwareImei tracker software
Imei tracker software
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
Cell phone hacking
Cell phone hackingCell phone hacking
Cell phone hacking
 
AMMU
AMMUAMMU
AMMU
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 
Personal cyber security tips remote work
Personal cyber security tips remote workPersonal cyber security tips remote work
Personal cyber security tips remote work
 
Steps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or LossSteps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or Loss
 
Modicare Mighty Guard
Modicare Mighty GuardModicare Mighty Guard
Modicare Mighty Guard
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 
Your smartphone can help protect itself – and
Your smartphone can help protect itself – andYour smartphone can help protect itself – and
Your smartphone can help protect itself – and
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
Identity theft
Identity theftIdentity theft
Identity theft
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 

Plus de Lookout

Dragon lady
Dragon ladyDragon lady
Dragon lady
Lookout
 
History of Lookout
History of LookoutHistory of Lookout
History of Lookout
Lookout
 
Sécurité Mobile 101
Sécurité Mobile 101Sécurité Mobile 101
Sécurité Mobile 101
Lookout
 

Plus de Lookout (20)

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go Evil
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile Development
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing Privacy
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring Hackers
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
 
10 Beautiful Enterprise Products
10 Beautiful Enterprise Products10 Beautiful Enterprise Products
10 Beautiful Enterprise Products
 
Hacking the Internet of Things for Good
Hacking the Internet of Things for GoodHacking the Internet of Things for Good
Hacking the Internet of Things for Good
 
What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?
 
Dragon lady
Dragon ladyDragon lady
Dragon lady
 
Dragon Lady
Dragon LadyDragon Lady
Dragon Lady
 
History of Lookout
History of LookoutHistory of Lookout
History of Lookout
 
Scaling Up Lookout
Scaling Up LookoutScaling Up Lookout
Scaling Up Lookout
 
Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21
 
Sécurité Mobile 101
Sécurité Mobile 101Sécurité Mobile 101
Sécurité Mobile 101
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Mobile Security at the World Cup

  • 2. HEADING TO THE WORLD CUP IN BRAZIL? 
  • 3. CHANCES ARE YOU’LL END UP IN A CROWD OR TWO PhotobyFlickruserRonnieMacdonald
  • 4. THERE IS A LOT GOING ON. ! Protecting your phone and all of the data on it may be the last thing on your mind, but taking a minute to think about mobile security can save a lot of heartache later on.
  • 5.  ALL IT TAKES IS A LITTLE COMMON SENSE, CAUTION AND THESE TIPS:
  • 6.  STAY NATIVE When you go to a new country, you probably don’t know much about the app ecosystem, which could expose you to threats you’re not even aware of.
  • 7. TIP: Make sure your device settings reflect your native or regular IP address. The Google Play Store should be available to your device as normal in Brazil, so keep using the store as it will be subject to Google's usual scrutiny.  
  • 8.  DON’T DOWNLOAD ON THE FLY A quick “unofficial World Cup app” download may mean downloading something scammy, especially if you don’t have time to read through permissions.
  • 9. TIP: Use trusted markets like Google Play and the Apple app store when downloading apps. Review all apps you download and consult the official World Cup app list before clicking. ! Make sure the Android system setting 'Unknown sources' is unchecked to prevent dropped or drive-by-download app installs.  
  • 10. AVOID USING PUBLIC WI-FI  Your phone’s 3G or 4G data connection is probably more secure than the Wi-Fi networks that thousands of people are using. Stick to a secure connection, especially if you’ll be logging into accounts, making purchases or entering any private information about yourself.
  • 11. TIP: Turn off Wi-Fi connectivity in your phone’s settings unless you’re confident in network security. 
  • 12. WATCH YOUR MOBILE WALLET $  You may come across Near Field Communication (NFC) mobile payment stations around the World Cup to avoid having to worry about carrying cash, but be cautious. 
  • 13. TIP: Turn on NFC signals only when necessary so the personal information stored in your phone doesn’t fall into the wrong hands. You can turn NFC on and off from your phone’s settings. 
  • 14. WATCH OUT FOR PHISHING  Does that email promising free tickets to the hottest games seem too good to be true? It probably is. Phishing scams use email, text messages, Facebook, and Twitter to send you links to websites that are designed to trick you into providing information like passwords or account numbers. These messages and sites are often very difficult to distinguish from legitimate sources.
  • 15. TIP: Do not click on links or open attachments in email messages unless you can verify who sent them and what they sent. 
  • 16. KEEP YOUR EYE ON THE BALL… ER…PHONE  From installing malware to taking the device itself, you never know what might happen to your phone when you’re not watching it closely.
  • 17. TIP: Never leave your device unattended. It only takes a moment for something bad to happen. 
  • 18. SET A PASSCODE **** If somebody other than yourself does end up with your phone, a password is the first line of defense for your personal data. Read the blog
  • 19. TIP: To keep your information private, create a strong passcode (read: not 1234 or 0000) for your phone and set your screen to auto-lock within five minutes.  Read the blog
  • 20. BE ABLE TO FIND YOUR SMARTPHONE  IF IT’S LOST OR STOLEN  You’re depending on your mobile phone for so much, including maps to get around, a credit card via NFC, a news feed and social communications. It may even hold your ticket back home. It would be a big problem if your phone is lost or stolen. 
  • 21. TIP: Install the Lookout app as a layer of insurance for phone loss. You’ll be able to locate your lost phone and even lock and wipe it if you want to protect your sensitive data. 
  • 22. For more mobile security tips, follow   