3.3 - CompTIA A+ Core 2

Security concerns

Application source/unofficial application stores

  • Unofficial application stores: These are platforms where users can download apps that are not vetted by official application developers or operating systems, often leading to increased risks of malware and data breaches. Once malware is on a phone, it can access many system resources.

    • DO NOT install APKs from an untrusted source.

Developer mode

  • Developer mode: Enables developer-specific settings for mobile devices (e.g., USB debugging, memory statistics).

  • iOS/iPadOS developer mode (enable): Enabled using Xcode via MacOS.

  • Android developer mode (enable): Settings → About Phone. Tap the build number seven times.

Root access/jailbreak

  • Rooting: Process of gaining root access to the core of an Android OS, allowing users to modify files/system settings.

  • Jailbreaking: Use of a privilege escalation to remove software restrictions imposed by Apple on devices running iOS and iOS-based operating systems.

  • Rooting/jailbreaking allows for custom firmware installation, installing unapproved/sideloaded apps, and circumvention of security features (e.g., MDMs).

Unauthorized/malicious application

Application spoofing

  • Application spoofing: Installation of what appears to be a legitimate app, but is actually a bootleg or malicious application. Always check the source of a download and the legitimacy of an application.

Common symptoms

High network traffic

  • High network traffic: Refers to higher than normal network use.

  • Troubleshooting high network traffic: Check built-in data use reports, a third-party reporting application, or run a malware scan.

Data-usage limit notification

  • Data-usage limit notification: Alerts users when they approach or exceed their allotted data cap, which can lead to reduced speeds or additional charges depending on the service provider.

  • Troubleshooting data usage limit notifications: Check data usage settings and run an AV scan to check for malware infections.

Limited/no internet connectivity

  • Limited/no internet connectivity: Typically occurs when a device is unable to establish a stable connection to the network, often due to issues with the router, modem, or ISP.

  • Troubleshooting low/no internet connectivity: Restart the device, check network settings, verify outages with an ISP/wireless network provider, or check for malware.

High number of ads

  • Troubleshooting high ad numbers: Run an anti-malware/AV utility - removes malware that’s producing a lot of ads.

Fake security warnings

  • Fake security warnings: These often masquerade as legitimate alerts from reputable security software, tricking users into thinking their system is infected, thereby prompting them to download additional malware.

  • Troubleshooting fake security warnings: Do not install any software the malware prompts you to. Instead, close the warning and run a reputable anti-malware tool to remove any threats.

Unexpected application behavior

  • Unexpected application behavior: This can manifest as applications crashing unexpectedly, running slower than usual, or displaying unusual error messages.

  • Troubleshooting unexpected app behaviour: Update the application to check you have all required system files and dependencies. If the problem persists, consider reinstalling the application to ensure that you have a clean version

Leaked personal files/data

  • Troubleshooting leaked personal files: Perform an app/anti-malware scan, factory reset the device, and clean install the operating system, reinstall data from online sources (e.g., Microsoft OneDrive, Google Play Store, Apple iCloud). Also, change passwords for critical resources (banking, enterprise, online shopping).