The SGSecure cellular software has been mounted on greater than 550,000 mobile gadgets on the grounds that its launch, in keeping with the Ministry of Home Affairs.
READ MORE ARTICLES :
- Why Repairing a Cell Phone is Cheaper than Buying a New One
- The rise of Jordan Barrett: How a lanky Byron Bay schoolboy was discovere
- Man escapes unhurt as mobile phone goes up in flames
- House panel told DHS reauthorization offers chance to secure mobile devices
- Sony Announces ‘PlayLink’ With Synchronous Multiplayer Games Communicating Between PS4 and iOS
The app, which permits the police and the Singapore Civil Defence Force to send indicators to the general public in times of emergencies, and for the general public to record suspicious sports, is a part of the SGSecure movement released closing year.
And on the Kolam Ayer, Emergency Preparedness Day the day went by, Communications and Information Minister Yaacob Ibrahim referred to as on more Singaporeans to download and use the app. “Some of our seniors here won’t be so familiar with the usage of apps. So I desire the ones of us who are greater digitally savvy can percentage with them what this app is all about,” he said.
He added that his ministry has included SGSecure messages into tv programs including Channel 8’s Eat Already and Happy Can Already, and Channel 5’s Steady Lah!.
Some 1,000 residents participated in the day prior to this’s occasion, and Dr. Yaacob referred to as on the network to enroll in in the fight against terror, now not simplest with the aid of staying alerted but also with the aid of staying united.
“When an attack takes place, we must stand together and not unfold rumors or untruths to reason distrust amongst our network. This will be playing directly into the palms of the terrorists’ desires. Their objective is to sow hatred and worry.”
Smartphones and other mobile computing devices are under attack and face major risks. They have become prime targets for cybercriminals. Many people are unaware.
Mobile phones, tablets and notepads have significant vulnerabilities. You need to be aware and take steps to keep them from becoming a victim of a cybercriminal and losing critical information.
Today’s smartphones are very powerful and can access as much confidential information as networked computers. Modern mobile platforms are incredibly capable and are routinely used by people who are on the go and in environments that are insecure. The sensitivity of the information being sent and received virtually includes any set of confidential information to which the user has access.
Mobile digital equipment faces the same attack vectors as desktop computers (e.g. malware, social engineering, signal interception and overlay attacks).
he security perimeter, in recent years, has been pushed back from the secure space behind a firewall to any location on the planet where a user can make a wireless connection. The user of a smartphone or a tablet functions outside of the protection of a computer network and the signal is “in the wild”. Unless robust encryption is being used, any information that is being broadcast through the air can be intercepted and compromised.
The fact that users routinely “sync” their mobile devices with desktop computers is another significant vulnerability. Both devices can easily be infected with malware if one or the other digital hardware has been compromised.