How to protect a mobile phone from Ransomware Attacks

1955

When a mobile phone is targeted by a ransomware attack, all the photos, contacts, messages, videos and files are locked until a ransom is paid to hackers.

An online survey conducted recently by McAfee states that nearly 28% of ransomware attacks are targeting online users who are active on smart phones and tablets. Thus, the discovery clearly states us the fact that we need to protect our phones from the prevailing mobile ransomware attacks.

So, how a ransomware spreads to smart phone?

When an online user visits a website to download apps, features or updates, pop-ups or tools that are mostly related to ad companies targeted the device.

Security analysts are warning us against such practices as they help hackers in gaining access to a device that might help them steal not only the info but also make them as botnets that help them in launching future cyber attack campaigns.

Then, how to protect a smart phone against such mobile ransomware attacks?

Firewalls and antivirus solutions do help in curbing ransomware attacks. While firewalls create a barrier between a device and the internet, antivirus helps repel the repercussions that occur with a ransomware attack.

Installation of software security patches helps in repelling file encrypting malware attacks to the core.

File Backup- Any type of file that is being stored on the mobile phone has to be backed up as having 2-3 copies of such files makes sense in a situation when we lose a phone or it gets infected by malware.

Downloading files and apps needs to be done from trusted and certified sources like a Google Playstore or Apple store. Downloading software from internet can make a device fall prey to malicious software. And FYI, any ransomware attack that occurs from the applications downloaded from the above stated two app stores is eligible for a refund of some sort.

Connecting a mobile phone to an internet when in need is actually being recommended by many security experts, as it limits the exposure of the device to prying eyes that are constantly on a lookout for vulnerable devices.

Ad
Naveen Goud is a writer at Cybersecurity Insiders covering topics such as Mergers & Acquisitions, Startups, Cyber Attacks, Cloud Security and Mobile Security

No posts to display