M2 Session2
M2 Session2
Course Coordinator:
Prof. Yogesh N
Assistant Professor
Dept. of CSD
ATMECE, Mysuru
Mobile and Digital Payments Security: Security Challenges and types of attacks
on Mobile devices, Security for Mobile Apps, Mobile Device Management tools and
techniques.
Mobile and digital payment security faces challenges like malware, phishing
attacks, data breaches, weak passwords, and unauthorized access through
malicious apps.
Risks: Malware can steal sensitive payment data, install keyloggers, or hijack
transactions.
Protection:
Use a reputable mobile security app.
Avoid downloading apps from unknown sources.
Regularly scan your device for malware.
Protection:
Enable biometric authentication
(fingerprint/Face ID).
Set up remote wipe capabilities (e.g., Find My
iPhone, Google Find My Device).
Use strong screen lock passwords.
Risks: Fraudulent emails, messages, or fake websites tricking users into revealing
payment details.
Protection:
Avoid clicking on suspicious links in emails
or messages.
Verify URLs before entering credentials.
Enable two-factor authentication (2FA).
Protection:
Use virtual credit cards or tokenized
payments.
Regularly monitor account statements for
suspicious transactions.
Use reputable payment platforms with strong
security measures.
YN Prof. Yogesh N, Dept. of CSD, ATMECE 9
Key Security Challenges for Mobile Payments
Weak Passwords
Protection:
Use complex, unique passwords for each
payment app.
Enable multi-factor authentication (MFA).
Use a password manager to generate and store
passwords securely.
Protection:
Avoid making payments over public WiFi.
Use a VPN when accessing financial services.
Disable auto-connect to public networks.
Unpatched Software
Protection:
Keep your phone’s OS and payment apps
updated.
Enable automatic updates where possible.
Avoid using outdated or unsupported devices
for mobile payments.
Human Error
Protection:
Double-check transactions before confirming.
Stay informed about common fraud tactics.
Educate yourself on secure mobile payment practices.
Wireless and mobile device attacks are a growing concern for individuals,
businesses, and governments.
Below are some of the most common types of Wireless and Mobile Device Attacks:
1. SMiShing
2. War driving
3. WEP attack
4. WPA attack
5. Bluejacking
6. Replay attacks
7. Bluesnarfing
8. RF Jamming
A "Smishing" attack is a type of cyber attack where a scammer tricks users into
giving out personal information by sending malicious links through text messages,
essentially a phishing attack done via SMS.
SMiShing uses Short Message Service (SMS) to send fraud text messages or links.
The criminals cheat the user by calling. Victims may provide sensitive information
such as credit card information, account information, etc.
War driving
War driving is a way used by
attackers to find access points
wherever they can be.
Since physical security steps help to protect a wired LAN, WEP attempts to provide
similar protection for data transmitted over WLAN with encryption.
WEP uses a key for encryption. There is no provision for key management with
Wired Equivalent Privacy, so the number of people sharing the key will continually
grow.
Since everyone is using the same key, the criminal has access to a large amount
of traffic for analytic attacks..
WPA attack
Wi-Fi Protected Access (WPA) and then WPA2 came out as improved protocols to
replace WEP.
WPA2 does not have the same encryption problems because an attacker cannot
recover the key by noticing traffic.
WPA2 is susceptible to attack because cyber criminals can analyze the packets
going between the access point and an authorized user.
Bluejacking
Bluejacking is used for sending
unauthorized messages to
another Bluetooth device.
Replay attacks
In a Replay attack an attacker
spies on information being sent
between a sender and a receiver.
Bluesnarfing
It occurs when the attacker copies
the victim’s information from his
device.
RF Jamming
Wireless signals are susceptible to
electromagnetic interference and
radio-frequency interference.
• In today’s session, you all have gone through the following topics
• Mobile and Digital Payments Security
• Security Challenges
• Types of attacks on Mobile devices