A lot of symptoms point to potential attacks on a mobile device, such as connection loss, power drain, slow data speeds, high resource utilization, and unintended connections. Others point at attacks that have already happened, such as leaked personal files, unauthorized account access, or unauthorized access to microphone or camera.
- Hello, folks, it's the great Mike Strami, once again dealing with issues that will show up on the A plus exam in terms of trouble shooting. Now what's actually very interesting is that Comptia decided to come up with a whole bunch of mobile device security symptoms and how we're going to deal with them. So in this particular episode, the Mike Strami will only be dealing with security issues that you're going to see on your mobile devices. However, I'm going to tell you something. As we go through these, I personally feel that a lot of these symptoms can show up in non-security related problems, so you're probably going to see some of these again, except we're going to be talking about 'em from a non-security in another episode. So you guys ready? Bring on the problems! What do we got first here? Okay, signal drop or a weak signal. Yes, that can most certainly manifest as a problem in terms of security. That's a very scary one, in that somebody might actually be turning down your connectivity. This is a classic example of what people want to do when they're going to be attacking your device, because they don't want you connecting or updating or anything being checked, so this is the first thing that they're going to do. This will be an incredibly obvious thing though. It's not going to be like, you know, you're going to be in the middle of Antarctica and suddenly your signal drops. You're going to be in the middle of a big city where you should be having five bars and instead suddenly everything drops off completely. In that type of situation, when you know you should be having good cell connectivity, good wifi connectivity, good Bluetooth connectivity, and suddenly it disappears, that's a concern. My answer is I'm going to be turning that phone off, like completely off, and then I'm going to be checking it out later. Another big one is they're going to be using a lot of things on your device. So you're getting things like power drain, slow data speed, high resource utilization, data transmission over the limit 'cause they're grabbing a lot of data. All of these collectively point to somebody who has put something on your system. Now it's almost certainly going to be an Android device if this happens, go Apple, and the only real answer there is to run some form of anti-malware because somebody's got something naughty on your system. However, I will also put in the caveat that a lot of times anti-malware for Android devices, while good, is an imperfect thing, and a lot of times if I see stuff like this, I'm going to start checking accounts, I want to see if there's something weird happening anywhere, in hopes that I might find something bad enough. The end result is I'm changing all my passwords all over the place. I mean everywhere. And then I'm going to be going in, and I'm going to do a factory reset on that device, and reinstall from scratch because I'm paranoid, that's why. Couple other ones you're going to see that will happen from time to time is like an unintended wifi connection or an unintended Bluetooth connection. These are very tricky, because you'll say, "Did I make that connection? "'Cause I don't remember whether I did or not." What I like to do to avoid this is in particular, a lot of these big, widespread wifi connections like AT&T wifi and things like that, I avoid them like the plague, primarily because it's too easy for me to suddenly be on an AT&T connection when I wanted to be in the coffee shop, and a lot of times bad guys will use these broad connections to get you connected to do whatever nefarious things that they want to do. So you definitely want to watch out for these problems, and in general, what you're going to be doing is you're going to be wiping that device completely and you're going to be installing from scratch after aggressively changing every single password you have. And I hope you're not one of those people who uses the same password for everything, 'cause it will absolutely murder you. Let me give you a little clue. Every time you go to an application or to a website, there's going to be some aspect of what you're connecting to, oh, I don't know, Dropbox.com ends with an X, wink wink, nudge nudge. Where you use a base password, and then you put something in there. Also, make sure you're using very complicated passwords. So, unless you actually knew the phone number where I was growing up in St. Louis, Missouri, on Portis Avenue, combined with the search radar used in the F-14 D Tomcat fighter plane, put those together, you're not going to have much luck trying to figure out my passwords. The other symptoms that they show to me aren't symptoms. They're bad. It's not a symptom, it's the fact, you've been attacked. Things like leaked personal data and files. If you've got personal information suddenly showing up, you're getting these emails with Bitcoin accounts going, I've hacked your system, and they'll actually put a password in there, they got you man. So this is bad. Unauthorized account access. Suddenly your Facebook is showing up with things that you never put there. Unauthorized location tracking where suddenly people are going, hey Mike, I saw you were at blah blah blah. Whereas location tracking should be incredibly private. Unauthorized camera, microphone activation. Suddenly people have recordings of you talking at the coffee shop with your favorite barista. Like, where did this come from? Folks, those aren't symptoms. Those are the results of a hack. In those situations, you go absolutely bananas. Number one, you wipe that device complete. Number two, you go online, do whatever you need to do. You get to every single one of these accounts, and you change the passwords. And number three, you take solace in whatever entity or spirits or philosophy that you choose, and hope that that person hasn't caught one place with one password where you were doing something you probably shouldn't have been doing in the first place. (laid-black music)
This Total Seminars course covers the exam certification topics. For information on additional study resources—including practice tests, lab simulations, books, and discounted exam vouchers—visit totalsem.com/linkedin. LinkedIn Learning members receive special pricing.
This course was created by Total Seminars. We are pleased to offer this training in our library.
We are a CompTIA Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.