Mobile Device Security and Social Media: How to Not Get Hacked

CSAM WEEK 3:
Mobile Device Security and Social Media: How to Not Get Hacked While Posting Your Lunch

So, you’ve got your fancy new phone and you’re ready to tweet, post, and gram your way into internet stardom. But hold up – before you share your avocado toast with the world, let’s talk about how you’re putting your phone (and maybe your life) on the line every time you click that ‘post’ button. Because believe it or not, hackers and cybercriminals aren’t just characters from movies who wear hoodies (although we really like hoodies).  But hey, I’m sure your 273 selfies are worth the risk, right?

Social Media: Hackers Love a Good Overshare

If you wouldn’t tell a random stranger that you’re out of town for a week or that your mom’s maiden name is a great password, maybe keep that off social, too. Oversharing on social media is like giving hackers a set of clues to your digital identity. Cybercriminals are patient and they are playing the long game. They don’t need everything at once, just enough puzzle pieces to complete a picture. This isn’t an idle threat; burglars are actively using social media to target victims[1]. At a minimum, if you have to post your vacation plans and photos, wait until after you get back home.

Let’s not forget about social engineering. Hackers don’t always go for brute force attacks; they’re sneaky. They’ll use your shared info – your vacation, your pet’s name, your favorite sports team – to craft convincing stories that trick you into handing over your credentials or even cash, guess your passwords, or even impersonate you. It’s basically catfishing for data, and spoiler: they’re really good at it.

Mobile Device Security and Social Media: How to Not Get Hacked

Public Wi-Fi: A Hacker’s Open Invitation (Especially at Airports)

Airports aren’t just hubs for travelers – they’re playgrounds for hackers. The free Wi-Fi is a convenience for you but a goldmine for cybercriminals. Connecting to these networks without caution allows hackers to intercept your data, including passwords and banking info. Next time you’re killing time before a flight, consider whether you really need to connect – or if your social media feed can wait until you’re on a safer network.

Take airport breaches as a cautionary tale. Some have been compromised because cybercriminals know travelers are prime targets for attacks. In fact, a 2020 study found that cyberattacks on the aviation industry skyrocketed by 530%, with many of those attacks targeting the free Wi-Fi in airports[2]. Airports are not just hubs for flights – they’re also hubs for hackers looking for easy prey.

Protect yourself:

Use Mobile Data or Hotspot

Why risk your personal data on public Wi-Fi when you can just burn through your mobile data plan? Sure, it’s expensive, but at least you won’t be handing over your passwords. I had a relative who connected to the airport WiFi at the Miami airport to download a Netflix movie despite knowing the risks and had her bank account information stolen. It took over a month for her to regain access to her account.

If You Insist on Doing This, Use a VPN

You’ve probably already heard a thousand times not to connect to these unsecured networks but continue to do so anyways. If you still choose to do this, a VPN will at least provide you a layer of encryption and anonymity. Attackers might go for easier prey.

Mobile Device Security and Social Media: How to Not Get HackedMalicious Apps: Hidden Threats on Your Phone

It’s easy to think an app is safe just because it’s on the Google Play Store or Apple’s App Store, but even official app marketplaces aren’t foolproof. Hackers sneak malware into apps disguised as games, utilities, or even fake versions of legitimate apps. Once installed, these apps can steal personal information[3], track your activities, or even hold your data hostage with ransomware.

To avoid downloading malicious apps:

  • Stick to official app stores (and even then, be wary).
  • Check app reviews and permissions. Does a flashlight app really need access to your contacts?
  • Delete unused apps. The less clutter on your phone, the better.
  • In-App Advertisements: Be wary of apps that have a lot of advertisements.

Bluetooth and Location Services: More than Just Convenience

Bluetooth is great for connecting to wireless earbuds or your car, but it’s also an easy entry point for hackers. Bluetooth attacks – yes, they’re a thing – allow hackers to access your device if it’s left open and discoverable. If you’re not actively using it, turn Bluetooth off. And if you’re connecting to a public Bluetooth device (like in a hotel), be extra cautious.

Similarly, location services are a double-edged sword. While it’s fun to tag yourself at your favorite restaurant or share your latest hike, broadcasting your location can make you vulnerable to stalkers or hackers tracking your movements. Many apps track your location in the background without you realizing it. To stay safe:

  • Turn off location services for apps that don’t need them.
  • Disable background location tracking for apps unless absolutely necessary.

So, What Can You Do About It?

Lock It Down

Put a PIN, fingerprint, or facial recognition lock on your phone. If you lose your phone and it’s not locked, congratulations, you’ve just gifted a criminal all your personal data.

Two-Factor Authentication (2FA – Use an Authenticator App

Don’t rely on email or SMS for 2FA – hackers can intercept those too. Use an authenticator app like Google Authenticator or Authy to keep your accounts secure.

Keep Your Apps Updated (No, It’s Not Just Bug Fixes)

Security patches are essential. When you ignore those update notifications, you're practically inviting hackers into your phone[4] .

Be Selective About What You Share

Oversharing can make you an easy target. Keep personal details like your location, passwords, or sensitive data off social media.

Reboot Your Phone Regularly

Restarting your phone may seem like a minor thing, but it can actually help flush out any malicious software running in the background. Restarting your phone clears temporary files and can shut down malware that may be silently hiding, waiting to strike. It's like giving your phone a quick shower to wash off the grime[5] .

To Wrap it All Up

Your phone might be smarter than the computer that sent astronauts to the moon, but that doesn’t mean it’s invincible. From sneaky apps to shady Wi-Fi networks, there are countless ways cybercriminals can get into your device and your life. By locking down your phone, being cautious about what you share, and staying on top of security practices, you can post your avocado toast without handing your data over to hackers. Remember, it’s not just about being smart online; it’s about staying one step ahead.

About the Author

Kirsten Hanson is a Senior Cybersecurity Analyst at CaseWorthy, with a Bachelor’s in Computer Science, specializing in cybersecurity. Beginning her career in 2021 as an intern, she dove into cybersecurity full-time upon graduation in 2022 and has remained in the field since then. Kirsten thrives on solving complex problems, particularly when it comes to automating security tasks to enhance efficiency and reduce manual work. She stays engaged in the latest cybersecurity developments by regularly attending conferences such as ISSA and DEF CON, keeping her skills sharp and current with industry innovations.

Home

Join Our Mailing List

Sign up to receive industry insights from the CaseWorthy blog, webinar invites, news releases, and upcoming events.

UNSUBSCRIBE ANYTIME.

Join Our Mailing List