Secret Security Threat: Mobile Devices


According to, there will be over 6.9 billion cell phone subscribers in the world by the end of 2013. And according to CNET over 84 million iPads have been sold by Apple representing 68% of the tablet market. Another 350 million iPods have been sold as well.

Virtually each phone, tablet or music device can represent some level of security threat to the user or business which allows them access to workplace computers, Internet and networks.

Less than a dozen years ago internal technology officers (CTOs) wanted company phones locked down, camera phones and iPods banned from the office. Now they are being compelled to address a bring-your-own-device trend, whether it’s a smartphone, music player or a tablet.

Meanwhile consumers and businesses alike are adopting a very casual attitude to downloading mobile apps – powerful computer programs that could potentially contain malicious code – from unknown authors, something few people would do on their PC.

However, 96% of smartphones and tablets do not have third-party security software installed, according to Canalys and Juniper Research. Further, if we’re talking music devices there may not be any security software commonly available.

The threat doesn’t seem to be hyperbole as BullGuard, an Internet and mobile device security provider, discovered 2,500 different types of mobile malware in 2011.

Let’s take a more detailed look at specific device/feature security threats.


Today our Android and iPhones have more computing power than was used on the Apollo 11 launch and moon landing.  These tiny devices contain massive amounts of personal information along with many applications that assist us in different ways.

Always keep in mind that your mobile phone is not just a phone but is a powerful small computer containing a wealth of personal information about you your current location, your contacts and your calendar.  We should be aware that it is easy for criminals to hack this information or infect the phone to get access to desired data.

Both the threat to devices and the threat to networks requires education. While many consumers read and digest information, many just ignore the threats. For example, how many people are aware of the need to PIN protect their mobile, lock their SIM and turn off Bluetooth (especially in discoverable mode)? How many actually know how to do this for their particular mobile phone? Basic mobile security like this requires a level of technological know-how that most mobile users don’t possess.


With the above in mind be sure that you set a password for your voicemail. Do not use the default voicemail and password.  Make hacking your voicemail more difficult by customizing your voicemail greeting and creating a new password.   The default passcode for the iPhone is just four digits, which is easily hacked in about 20 minutes. Set your phone to require a longer passcode with alphanumeric characters. You can also set your iPhone to automatically erase all contents after ten failed passcode attempts.  Turning off the “Simple Passcode” feature will allow for a longer password.  Directions on how to do this are at the following address:  Android phones will allow you to create a swipe password feature which is more secure.  Never store sensitive personal details, such as your ATM PIN number or account passwords, on your mobile phone.

Cell Phone Wallet

Cell phones are now becoming our wallets.  Just by swiping your cell, you can purchase goods and services.  This sounds great but be aware that Google wallet has already been hacked.  There are easy step-by-step instructions on the internet on how to hack a wireless phone.  Of course it’s a federal offense but it is very easy for criminals to infect a phone just by sending an email attachment or SMS message. The telephone function itself can also be hacked which can re-route phone calls.  So if you think you are calling your bank, you may actually be talking to someone in Eastern Europe. Organized crime groups are aware of all the major banks phone numbers.

Most of us do not realize how much privacy we are giving up just by using a wireless phone.  Your phone is tracking you 24/7 so your travel pattern can be developed over time.

Cell Phone Calendars

For those of us that use the calendar function on our phones, your phone knows where and when you are going.  Don’t become paranoid but be aware of what the possible exposures are.

Blue Tooth

If you use Bluetooth technology, you may want to reconsider or be selective in it use since it is a weak technology and is subject to being hacked especially in large crowds.

You can reduce your overall risk just by turning off access to the technologies on your phone that you do not need. In particular, consider disabling Bluetooth, GPS and/or Wi-Fi. This is particularly important when using your phone in crowded areas, such as airports.

Find My iPhone

If you have an iPhone, you can enable a feature called “Find My iPhone” this is an app that can locate on a map a lost iPhone.  If you are unable to find your phone, it also allows you to remotely wipe all data from the phone to prevent it from falling into the hands of thieves. You can restore your data to a new phone from iCloud or iTunes. You can find out how to enable this feature at the following web address:

“Jail Breaking” iPhones

This is a new term that has surfaced in the past few years, which enables an iPhone to run applications not available through the official Apple App Store.  This sounds pretty cool but it exposes your phone to greater security risks and infections by computer malware. Probably most adults are not “jailbreaking” their phones but this seems to be fairly popular among the youth.

QR Codes

These are codes that you probably have seen on signs, posters and in magazines that can be scanned by our mobile devices to provide us with information about a product, service or other information.  They look like a square full of dots, dashes and boxes. Please use caution with QR codes. Be suspicious of any that offer no context or description. Malicious codes often appear with little or no text, which can infect your phone with a virus. Never provide personal information on any web site that you arrive on via a QR code.


This section may be more relevant to those in business but none-the-less it is good to be smarter about the mobile devices we have.  Similar to the web cams on our computers all modern mobile phones have microphones that can be remotely activated without your knowledge and many have video capabilities that are similarly vulnerable. Consider it a bugging device whenever you are engaged in any sensitive conversation or take part in a sensitive meeting you can prevent having your discussion recorded by turning off the phone and removing the battery, if possible. If your phone’s battery is not removable, leave the phone in another room.  Ensure that all participants in a given meeting take similar action.


Keep it on only when you need it.  Follow the advice: “If you know where you are, they know where you are as well.”

Disposing of an old phone

When disposing of an old phone, whether recycling, selling or donating it, do a factory-reset to clear all your data. You will find directions on how to do this for the iPhone at the following web address: and instructions for an Android phone at the following site:


Every app has its own specific privacy and permission requirements and settings. Verify that you are not providing any information to an app that is not needed to run the app.  You should notice when a Flashlight app need access to personal information.  Experts have concluded that flashlight apps contain more malware than any other app.  Since I’ve learned about Flashlight apps they have now been removed from my iTouch.   This was an application that I never used anyway.

Organized crime was the first to create some of the banking apps.  People were entering their banking information but then the banking function did not work.  You know the rest of the story.

You can investigate the privacy, source and security for apps you are considering to load on your mobile device by going to This is a free service run by Stanford University.

Be aware that the apps available through online marketplaces are not necessarily vetted for security or quality. In some cases, no review at all is conducted on offered apps. Only allow automatic updates on trusted apps. The Android app store (Marketplace) has been particularly affected by security problems with its apps.

Be very wary of free versions of popular paid apps offered by unknown companies; they are often bait trying to get you to download spyware, and the chances that they contain malware are high.

What to do?

Many IT experts as also security experts that are trained and certified across all kinds of hardware, software and networks. Today’s multi-device environment invites serious security breaches. Only a computer expert with the right security credentials can help you get your arms around the problem.

If you’d like more help, please contact eMazzanti Technologies, or call 201-360-4400.




Carl Mazzanti is Co-Founder and President of eMazzanti Technologies, Microsoft’s four time Partner of the Year and one of the premier IT consulting services for businesses throughout the New York metropolitan area and internationally. Carl and his company manage over 400 active accounts ranging from professional services firms to high-end global retailers.

eMazzanti is all about delivering powerful, efficient outsourced IT services, such as computer network management and troubleshooting, managed print, PCI DSS compliance, green computing, mobile workforce technology, information security, cloud computing, and business continuity and disaster recovery.  

Carl Mazzanti is also a frequent business conference speaker and technology talk show guest and contributor at Microsoft-focused events, including frequent prominent roles at the Microsoft Inspire (Worldwide Partner Conference / WPC).

Carl, a serial Entrepreneur, gives back to the community through Entrepreneur teaching engagements at Georgetown University, the company’s ocean wildlife conservation effort, the Blue Project, and Tree Mazzanti.



Video Resources

Are You It Resources Effective In The New Normal


Are Your IT Resources Effective in the New Normal?

Align2020 A Virtual Conference


Align 2020
Cyber Security, Compliance & Collaboration

Best Practices For Working In A Modern, Mobile, And Secure Environment


Best Practices for Working in a Modern, Mobile, and Secure Environment