• Print

What are some activities that make mobile devices vulnerable to attack?

What are some activities that make mobile devices vulnerable to attack?

The United States Government Accountability Office (GAO) recently issued a report to Congress called,  “Information Security: Better Implementation of Controls for Mobile Devices Should Be Encouraged.”  The Report identified these four sources of mobile device attacks:

  • Software downloads: Unsuspecting users download malicious applications (apps) made to look like games, device patches, or utilities. Once the software is downloaded on a mobile device, unauthorized persons can access health information or system resources.
  • Visiting a malicious website: When a user visits a malicious website, malware is automatically downloaded. The app either downloads automatically or the user must take action (such as clicking on a hyperlink) to download the app.
  • Direct attack through the communication network: Some attacks try to intercept communications to and from the device to get unauthorized use of mobile devices and access to sensitive information.
  • Physical attacks: Unauthorized persons may be able to access and use health information stored on a lost or stolen device.



< Back to FAQs