SlideShare uma empresa Scribd logo
1 de 11
Baixar para ler offline
Smartphone Antivirus Protection:
Why you need it
Brian Gongol
InlandEcon.com
March 20, 2014
Why have antivirus protection
on your smartphone?
1. Photos
If someone hacks or
steals your phone,
they can take all of
your pictures and videos
2. Omnipresence
Other computers don't follow you
into the bathroom,
the doctor's office,
and to bed at night
3. Financial security
Phones are rapidly becoming
full-fledged digital wallets
4. E-mail security
E-mail is the
"key to the kingdom"
for an identity thief
5.Apps
You can't be sure that
every app is safe
Other good reasons to have
antivirus protection on your smartphone
Locate/Kill Switch
Locate your phone
if it gets lost.
Wipe it clear
if it's stolen.
Insurance
It's cheap insurance
Beyond antivirus
Viruses
Trojan horses
keystroke loggers
spyware
phishing sites

Mais conteúdo relacionado

Mais procurados

Your smartphone can help protect itself – and
Your smartphone can help protect itself – andYour smartphone can help protect itself – and
Your smartphone can help protect itself – and
RandyBett
 

Mais procurados (19)

Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
 
16 tips to thwart mobile security threats
16 tips to thwart mobile security threats16 tips to thwart mobile security threats
16 tips to thwart mobile security threats
 
AMMU
AMMUAMMU
AMMU
 
Your smartphone can help protect itself – and
Your smartphone can help protect itself – andYour smartphone can help protect itself – and
Your smartphone can help protect itself – and
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Internet security
Internet securityInternet security
Internet security
 
Him
HimHim
Him
 
Safety And Security Of Data 2
Safety And Security Of Data 2Safety And Security Of Data 2
Safety And Security Of Data 2
 
Presentation about security i.t. by antonio espiga and sergio gómez
Presentation about security i.t. by  antonio espiga and sergio gómezPresentation about security i.t. by  antonio espiga and sergio gómez
Presentation about security i.t. by antonio espiga and sergio gómez
 
identity theft
identity theftidentity theft
identity theft
 
Grooming. x2
Grooming. x2Grooming. x2
Grooming. x2
 
Aejay
AejayAejay
Aejay
 
Comslide 3
Comslide 3Comslide 3
Comslide 3
 
Yassa edt finalproject
Yassa edt finalprojectYassa edt finalproject
Yassa edt finalproject
 
C Senior Presentation: The Internet
C Senior Presentation: The Internet C Senior Presentation: The Internet
C Senior Presentation: The Internet
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
 

Destaque (6)

Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 

Semelhante a Why you need antivirus protection on your smartphone

mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxmobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
vrandmandora1
 
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
Commonwealth Telecommunications Organisation
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
Kevin Lee
 

Semelhante a Why you need antivirus protection on your smartphone (20)

MOBILE SECURITY.pptx
MOBILE SECURITY.pptxMOBILE SECURITY.pptx
MOBILE SECURITY.pptx
 
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxmobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 
Mobile security
Mobile security Mobile security
Mobile security
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
 
Mobile security
Mobile securityMobile security
Mobile security
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
Is My Android Spying on Me?
Is My Android Spying on Me?Is My Android Spying on Me?
Is My Android Spying on Me?
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Cell phone hacking
Cell phone hackingCell phone hacking
Cell phone hacking
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for android
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile Security
 

Mais de Brian Gongol

Mais de Brian Gongol (20)

Energy Policy is Water Policy - v08 (March 2024)
Energy Policy is Water Policy - v08 (March 2024)Energy Policy is Water Policy - v08 (March 2024)
Energy Policy is Water Policy - v08 (March 2024)
 
Controlling Your Surges - v.21 - Iowa AWWA Short Course 2024
Controlling Your Surges - v.21 - Iowa AWWA Short Course 2024Controlling Your Surges - v.21 - Iowa AWWA Short Course 2024
Controlling Your Surges - v.21 - Iowa AWWA Short Course 2024
 
Preserving Institutional Memory in a Utility - v.25
Preserving Institutional Memory in a Utility - v.25Preserving Institutional Memory in a Utility - v.25
Preserving Institutional Memory in a Utility - v.25
 
Aeration from Afar - v.16
Aeration from Afar - v.16Aeration from Afar - v.16
Aeration from Afar - v.16
 
Energy policy is water policy - v.04
Energy policy is water policy - v.04Energy policy is water policy - v.04
Energy policy is water policy - v.04
 
Introduction to Pump Hydraulics - v.15
Introduction to Pump Hydraulics - v.15Introduction to Pump Hydraulics - v.15
Introduction to Pump Hydraulics - v.15
 
How to Communicate with Boards and Councils
How to Communicate with Boards and CouncilsHow to Communicate with Boards and Councils
How to Communicate with Boards and Councils
 
CLAWS of Pump Maintenance - v.11
CLAWS of Pump Maintenance - v.11CLAWS of Pump Maintenance - v.11
CLAWS of Pump Maintenance - v.11
 
CLAWS of Pump Maintenance - v.10
CLAWS of Pump Maintenance - v.10CLAWS of Pump Maintenance - v.10
CLAWS of Pump Maintenance - v.10
 
Getting Your CLAWS into Pump Maintenance
Getting Your CLAWS into Pump MaintenanceGetting Your CLAWS into Pump Maintenance
Getting Your CLAWS into Pump Maintenance
 
Aeration from afar - v.13
Aeration from afar - v.13Aeration from afar - v.13
Aeration from afar - v.13
 
Dealing with Mother Nature's Attitude Problem - v.19
Dealing with Mother Nature's Attitude Problem - v.19Dealing with Mother Nature's Attitude Problem - v.19
Dealing with Mother Nature's Attitude Problem - v.19
 
25 Ways to Screw Up a Lift Station Design - v.10
25 Ways to Screw Up a Lift Station Design - v.1025 Ways to Screw Up a Lift Station Design - v.10
25 Ways to Screw Up a Lift Station Design - v.10
 
Media relations for the water industry - v.20
Media relations for the water industry - v.20Media relations for the water industry - v.20
Media relations for the water industry - v.20
 
Breaking the conveyor-belt myth - v.09
Breaking the conveyor-belt myth - v.09Breaking the conveyor-belt myth - v.09
Breaking the conveyor-belt myth - v.09
 
Aeration from afar - v.03
Aeration from afar - v.03Aeration from afar - v.03
Aeration from afar - v.03
 
Schoolkids now, customers later - v.14
Schoolkids now, customers later - v.14Schoolkids now, customers later - v.14
Schoolkids now, customers later - v.14
 
The maintenance you don't have to touch - v.07
The maintenance you don't have to touch - v.07The maintenance you don't have to touch - v.07
The maintenance you don't have to touch - v.07
 
Ten steps to building a 21st Century water workforce - v.18
Ten steps to building a 21st Century water workforce - v.18Ten steps to building a 21st Century water workforce - v.18
Ten steps to building a 21st Century water workforce - v.18
 
Dealing with Mother Nature's attitude problem - v.19
Dealing with Mother Nature's attitude problem - v.19Dealing with Mother Nature's attitude problem - v.19
Dealing with Mother Nature's attitude problem - v.19
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

Why you need antivirus protection on your smartphone