Has my mobile security advice changed?
Terence Eden reviews mobile security advice from a decade ago, emphasizing skepticism towards messages from trusted contacts, the importance of two-factor authentication, and the use of password managers and physical security measures.
Read original articleTerence Eden reflects on his mobile security advice from a decade ago, assessing its relevance in today's context. Key points include the importance of skepticism towards messages from trusted contacts, as scams often spread through familiar channels. He emphasizes that simply changing passwords after a breach is insufficient; users should also revoke access to third-party applications. Two-factor authentication (2FA) remains crucial, with a shift from SMS to authenticator apps recommended for enhanced security. Eden advises against downloading apps from unofficial sources, despite some risks associated with official app stores. He notes that while virus checkers were once essential, improved permission models in modern operating systems have reduced their necessity. Password managers are strongly endorsed to combat the use of weak and repeated passwords. Physical security measures, such as using wrist straps to prevent theft, are highlighted as vital, given the high rate of phone theft. Eden also discusses the diminishing need for VPNs due to the rise of HTTPS, suggesting that they can sometimes introduce more risks than benefits. He concludes with additional recommendations, including regular data backups, activating emergency features, and using ad-blockers to enhance security.
- Staying skeptical of messages from trusted contacts is crucial to avoid scams.
- Two-factor authentication is essential, with a preference for authenticator apps over SMS.
- Password managers are recommended to manage complex passwords securely.
- Physical security measures, like wrist straps, can help prevent phone theft.
- Regular data backups and emergency feature activation are important for data protection.
Related
Second Factor SMS: Worse Than Its Reputation
Security researchers accessed 200M 2FA-SMS messages, exposing a flaw in IdentifyMobile's system used by Google, Amazon, and Facebook. CCC recommends more secure authentication methods due to significant risks.
The Sad State of Two-Factor Authentication in U.S. Banking (2020)
The article critiques U.S. banking's reliance on SMS-based two-factor authentication, highlighting its vulnerabilities. It advocates for stronger security measures, including hardware tokens and biometrics, urging consumers to demand better protections.
It is dangerously easy to hack the worlds phones
Experts warn that vulnerabilities in global telecommunications technology have been exploited for surveillance in the U.S., highlighting urgent security needs to protect user privacy and national security.
Loophole in digital wallet security even if rightful cardholder doesn’t use one
A study from the University of Massachusetts Amherst reveals significant security vulnerabilities in digital wallets like Apple Pay and Google Pay, urging enhanced security measures and user vigilance to prevent unauthorized transactions.
Why Login Security Sucks
Login security is often complex and user-unfriendly, with inconsistent practices. A simpler approach using browser-based credential management could improve both security and user experience in login systems.
Related
Second Factor SMS: Worse Than Its Reputation
Security researchers accessed 200M 2FA-SMS messages, exposing a flaw in IdentifyMobile's system used by Google, Amazon, and Facebook. CCC recommends more secure authentication methods due to significant risks.
The Sad State of Two-Factor Authentication in U.S. Banking (2020)
The article critiques U.S. banking's reliance on SMS-based two-factor authentication, highlighting its vulnerabilities. It advocates for stronger security measures, including hardware tokens and biometrics, urging consumers to demand better protections.
It is dangerously easy to hack the worlds phones
Experts warn that vulnerabilities in global telecommunications technology have been exploited for surveillance in the U.S., highlighting urgent security needs to protect user privacy and national security.
Loophole in digital wallet security even if rightful cardholder doesn’t use one
A study from the University of Massachusetts Amherst reveals significant security vulnerabilities in digital wallets like Apple Pay and Google Pay, urging enhanced security measures and user vigilance to prevent unauthorized transactions.
Why Login Security Sucks
Login security is often complex and user-unfriendly, with inconsistent practices. A simpler approach using browser-based credential management could improve both security and user experience in login systems.