What's the best way to protect against Trojans on mobile phones, particularly those that try to steal SMS messages?...
Is there a way to encrypt SMS messages between mobile phones in the enterprise?
Best practices for securing a smartphones have been covered in some of our recent Ask the Expert questions. The same security steps to secure your smartphone will protect it from mobile Trojans that steal SMS messages. Many applications that install on Android-powered smartphones request more permissions than necessary, and may even request permission to SMS messages when not needed. Users may not carefully review the access they grant to an application when it’s installed and may unnecessarily allow an application access to SMS messages. Users should carefully review if an application needs access to SMS messages before granting the access and installing the application.
Encrypting text messages can help protect against rogue or Trojan applications that steal SMS messages. There are ways to encrypt SMS messages between individual mobile phones using freely available applications for Android smartphones. For example, WhisperSystems TextSecure allows you to send and receive encrypted text messages and encrypts the text messages stored on your smartphone. Both the sender and the receiver need to have TextSecure installed, but the software requires no other configuration other than a password. Using this application could enable the secure usage of SMS messaging. Commercial applications like Protected SMS can be used for corporate usage.
Dig Deeper on Mobile security threats and prevention
Related Q&A from Nick Lewis
A new remote access Trojan called UBoatRAT was found spreading via Google services and GitHub. Learn how spotting command-and-control systems can ... Continue Reading
CyberArk researchers created an attack called Golden SAML that uses Mimikatz techniques and applied it to a federated environment. Learn more about ... Continue Reading
The use of botnets to spread Scarab ransomware intensifies the threat for enterprises. Discover the best way to respond to such a threat and protect ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.