Hello Everyone. Rick here for security on iPad and I would like to thank you for visiting my website.
Well if you found your way to this site, I’m assuming you own an iPad or are at least considering purchasing one. Since the release of the iPad in the spring of 2010, and the subsequent release of the iPad 2 barely a year later, it is estimated that about 40 million have been sold. It has been such a huge success because people like its functionality but love its portability.
The portability of mobile devices may have solved a lot of productivity problems but they have created a whole new scenario of security threats. The increased usage of iPads, smartphones and other mobile devices has contributed greatly to a tremendous rise in internet hacking and identity theft. Compounding this problem is the growing number of personal mobile devices being used in the workplace as they contain both personal and sensitive corporate data not protected and regulated by management. Since mobile devices have been a major cause of security breaches and theft of personal information, more and more iPad owners are becoming increasingly concerned about security on iPad.
How secure is the iPad? All considered the iPad is a fairly secure device. This is due mostly to the innovative creation of the iOS, iPad’s operating system, which “sandboxes” each app, effectively eliminating any sharing of information between them. For security reasons, all apps must be obtained through the Apple App Store where they are signed and verified by iTunes/Apple. However, even some “bad apples” have found their way on to the App Store shelf exposing flaws in the iOS and Apples thorough screening process (read here: Jailbreak and InstaStock ). Despite features like data encryption on password protected tablets and constant security updates by Apple, there always seems to be a way to circumvent security. No platform is 100% safe.
Now, what can you do to ensure your security on iPad? Ultimately, you are responsible for your ipad security protection. With just these few precautions, you can be reasonably assured that your data and your identity will remain safe:
If you need help with any of the following consult your iPad manual or read my earlier post: “What Can An iPad Do?”
1. Keep your Operating System Current. Periodically update your iOS as Apple is constantly adding new features and security updates to protect your device.
2. Do Not Jailbreak Your iPad. Jailbreaking is the process of removing the limitations imposed by Apple mainly for the purpose of installing unapproved apps and programs. However, jailbreaking allows the user root access to the iOS leaving it vulnerable to hackers. Aside from voiding your warranty, some jailbreak codes can actually contain malware.
3. Enable A Passcode. Configuring a passcode will automatically enable data encryption on your iPad. Set it to lock at 15 minutes or less. For added security, turn off the Simple Passcode option and use a stronger alphanumeric code instead.
4. Configure Local Wipe. The data on your iPad will be wiped after ten failed passcode attempts. A lost or stolen device is probably your greatest security threat so treat your iPad like the expensive and sophisticated piece of equipment that it is.
5. Turn Wi-Fi And Bluetooth Off. Disabling Wi-Fi when not in use and turning off Bluetooth will not only save your battery but keep your information safe from possible snoopers.
6. Set Up “Find My iPad”. If your iPad is lost, misplaced or stolen, signing in to icloud.com from any internet access will allow you to approximate its location. Depending on the sensitivity of the data it contains, you will then have the option of remotely setting a passcode lock or initiating a remote wipe. If eventually recovered, your data can be restored through iCloud or iTunes.
7. Secure Your Networks. At home or at the office or on any network that you control use WPA2 (Personal mode) level of encryption with a strong passcode.
8. On Public Wi-Fi use a VPN. Utilizing a VPN (virtual private network) will make your network connections as secure as possible. When using Wi-Fi in public places, this is the safest thing to ensure your internet security on ipad.
While on any public network, you should always use a VPN. Almost all internet security and identity theft experts recommend this and I agree wholeheartedly. In the enterprise, where security is a major concern, most companies have some sort of VPN in place. If you regularly access the internet at public hotspots, then this is really a no brainer for your security on iPad folks. When using public Wi-Fi, you are in essence broadcasting your personal information to a wireless router and any hacker, with as little as a cell phone and an easily acquired program, can view your passwords, logins, email and other sensitive data.
The portability of the iPad is its most attractive feature. Being able to access the internet wherever you go was possibly the determining factor in making the purchase. When traveling, you are not going to want to leave your iPad at home. But if you use public Wi-Fi in hotels, airports, and cafes, you are putting yourself at risk. Generally, a 3G connection is considered to be more secure but even they have had security issues (read here: Apple’s Worst Security Breach) and traveling abroad can get ridiculously expensive.
So, what is the solution? Use a VPN. By utilizing a VPN, all the data coming into and leaving your iPad will be highly encrypted, safe from the hands of even extremely skilled hackers. All your internet browsing is completely cloaked and you remain anonymous even to your internet service provider. Using a VPN is also antivirus for the iPad. The very nature of how VPNs work makes it almost impossible to be infected with any viruses while using their protection. Another great feature of VPNs is that they fully unlock websites and services that may be blocked by your school, employer or any country you may be in. In today’s world, in my opinion, a VPN is a must for security on iPad
Now I know a lot of you reading this don’t even have a simple passcode set and are wondering if you possess the technical skills to implement a VPN. Well, if you lack the technical knowledge and still want the security and protection of an iPad VPN, the good people at hidePad have developed a push-button simple, all-in-one application, that is custom tailored to the iPad. Focusing on simplicity and security, they can have you connected and protected in less than two minutes. HidePad works worldwide with no need to set up proxies. HidePad VPN works with ALL iPads, including the iPad Mini and the iPad 4.
Well, I have given you my recommendations and now the rest is up to you. I cannot overly stress how important this is for your iPad security protection. Don’t become another identity theft statistic. Just click the link below and start enjoying some of the security and privacy that is sorely missing in the rest of our lives.
Thanks for reading,
Rick for Security on iPad
To keep you informed of the latest statistics and threats to your security on iPad, I would like to present to you the following article which appeared on AOL blog Digital Matters in March 2013:
Take a look around any coffee shop, airport, hotel or library, and you’ll quickly notice that Public WiFi hotpots have become the rule, not the exception. See all those people tapping away on their smart phone, tablet or laptop in a one-man/woman quest to check their email, pay their bills, tweet, update their status and so on? They’re your proof. In 2011, the number of WiFi hotspots reached 1.3 million worldwide. By 2015, WiFi users will be able to connect to 5.8 million hotspots, according to a report commissioned by the Wireless Broadband Alliance.
The fact is, if you use a laptop or any kind of WiFi-enabled mobile device away from home, it’s next to impossible to pass up the ease and convenience of connecting to a Public WiFi network every now and again. Unfortunately, not all hotspots are safe for you to do so. As the number of hotspots grows exponentially, so do the security risks for their users. The reason is simple: Because WiFi signals are radio waves, anyone within range of a public WiFi network can listen in on what users are sending and receiving. Unlike home WiFi networks, the vast majority of public WiFi hotspots don’t encrypt the data being transmitted through them. Therefore, when you connect to a hotspot, everything from your email and your bank account and credit card information to your social media content may be fair game for hackers. The 2013 Identity Fraud Report released by Javelin Strategy & Research found that the number of identity fraud victims increased to 12.6 million consumers last year – hitting more than one out of every 20 U.S. consumers. According to the report, smartphone and tablet users were constant targets of cyber criminals using malware and phishing exploits and compromising unsecured WiFi connections to steal users’ sensitive information.
How Hotspot Hackers Steal Your Identity and Your Credit
Sniffer software. Allows a hacker to monitor the traffic traveling to and from a computer that’s connected to a public network. This is the most basic kind of attack and can eavesdrop on emails and chats, capturing log-ins and personal or financial information. A hotspot user will never suspect their information has been compromised.
Address Resolution Protocolor ARP Spoofing. This method redirects the network traffic to the hacker, modifying it or blocking it altogether without being detected. ARP spoofing is often used to open the door for other kinds of attacks such as sidejacking.
Sidejackingor session hijacking.This happens when a hacker sniffs a hotspot user’s Web session. That information is used it to clone the user’s account, allowing the hacker to do anything the user can do while logged into a website. Sidejacking typically happens when users type in their user names and passwords when connecting to a website not properly protected by https
Evil Twinor WiPhishing. Evil Twins are designed to look like real hotspots. But when users log in to them, they unknowingly expose their passwords and other sensitive information to hackers. Evil Twins can be launched from laptop at a hotspot or from as far as 300 feet away. Warnings signs that hotspot users should watch for are unusual variations in the lettering, logo or wording of legitimate hotspots. Once an Evil Twin gains access to your computer, it can launch a
Man-in-the-Middle Attack which allows it to eavesdrop on Internet traffic and capture passwords and account and payment information. More sophisticated Evil Twins can even control which websites appear.
Ad hoc or peer-to-peer network. Another sign you could be in for trouble: Two little computer symbols that appear when you’re trying to connect to a wireless network. That means you’re connecting to someone else’s laptop – an ad hoc or peer-to-peer network, not a WiFi hotspot. Once you connect to a viral network like that, your shared files can be accessed by every other laptop connected to the network.
Rogue ad hoc networks. With names like “Free Public WiFi,” these networks can turn up wherever there are public WiFi hotspots and can be used to trick unsuspecting WiFi users into connecting to them. Not all ad hoc networks are created by hackers. But it’s impossible to distinguish the real ones from the fakes. So to be safe, you should steer clear of them all.
WiFi users whose laptops were hacked at airport, hotel and coffee house hotspots have filed complaints with the Federal Trade Commission and the Better Business Bureau. Here’s what you can do to protect your sensitive information at WiFi hotspots:
Don’t Get Hacked at a Hotspot
The Only Way to Be Safer Is to Be Invisible at WiFi Hotspots
But it’s important to remember that an encrypted website only protects the information sent to and from that site, not all the information you send over a public wireless network. The best way to protect all your information from hotspot hackers, every time you connect, is to use a Virtual Private Network. VPNs encrypt all the data travelling to and from your laptop and other mobile devices by sending it through a secure tunnel that’s invisible to hackers. That’s why the Federal Trade Commission recommends using a VPN when you connect to public WiFi networks in their article Tips for Using Public Wi-Fi Networks.
Unfortunately, survey after survey shows that most WiFi users aren’t protecting their information at public hotspots. A 2012 survey conducted by the Identity Theft Resource Center with PRIVATE WiFi found that 24% of respondents said they made purchases in a public hotspot while 57% admitted to accessing confidential work-related information. Yet only 27% of those polled said they used a VPN to protect their data. And 44% said they weren’t even aware that there was a way to protect their sensitive information when using a public hotspot.
Remember, WiFi hotspots are public wireless networks. Whether they’re free or paid hotspots, that means there’s no privacy. Anyone can join and listen in to what’s going on. That makes you totally responsible for protecting your wireless security. The 2013 Javelin Identity Fraud Report found that tablet users were 80% more likely than other consumers to be victims of ID fraud. Every time you use a hotspot for online banking or shopping or checking your email, a hacker could be sitting right next to you drinking a cup of coffee. Or he could be waiting to catch the same plane as you at the airport. Or staying in a hotel room down the hall. And you’ll never know he’s stealing your confidential information – until it’s too late.
Free WiFi hotspots are a great resource for work and for play. But if you don’t protect your personal information when you’re using them, they could end up costing you a bundle. Every three seconds, someone in the U.S. becomes a victim of identity fraud. So the next time you’re about to use a WiFi hotspot, you may want to take the necessary precautions before you connect.
The above article explains why WiFi hotspots are not safe and why you must take precautions to ensure your security on ipad. Identity theft is increasing at an alarming rate and Apple products are becoming a mainstream target for hackers.
Mr. Lawson states: “The best way to protect all your information from hotspot hackers, every time you connect, is to use a Virtual Private Network.” All internet security experts, including the FBI and the Federal Trade Commission, and I agree wholeheartedly on this point. Using a VPN is the only way to safely secure your private information when using public WiFi.
The good people at hidePad have developed a push-button simple, all-in-one app, that is custom tailored to the iPad. Focusing on simplicity and security, and ease of installation, they can have you connected and protected in less than two minutes. With 37 secure VPN servers around the globe, HidePad works worldwide with no need to set up proxies. Think about that. Wherever you travel, your iPad will have rock-solid, secure connections. HidePad VPN works with ALL iPads, including the iPad Mini and the iPad 4.
Most people are unaware of the perils of using public WiFi hotspots and that there is something that they can do to protect themselves. At prices starting for as little as $4.99 a month, there is no reason to leave yourself at risk, as identity theft can cost you a fortune. Don’t become another identity theft statistic. Just click the link below and start enjoying some of the security and privacy that is sorely missing in the rest of our lives.
Thanks for reading,
Rick for Security on iPad
The following article was posted on 5/18/12 on www.arnnet.com.au:
The more Apple devices are used in enterprises, the more attractive they become to cyber criminals
Taylor Armerding (CSO (US))
18 May, 2012 07:59
Apple devices — ever more popular in the workplace — are about to become more popular with cyber criminals.
That is one of a number of findings in security vendor Zscaler’s Q1 State of the Web Report that should be unsettling to enterprises that permit employees to “bring your own device,” or BYOD.
The biggest mobile targets of malware so far have been devices powered by Android, since it is in the widest use and is an open platform.
But that may change soon. Zscaler’s report said in a survey covering 200 billion transactions, Apple iOS web traffic jumped from 40% in the last quarter of 2011 to 48% in the first quarter of 2012, surpassing Android, which dropped to 37%.
More iOS traffic means more Apple devices in use at enterprises, which is likely to make them more attractive to cyber criminals.
And a significant majority of enterprises allow BYOD: A survey released in April by the SANS Institute found that 61% of more than 500 companies surveyed allowed BYOD. A press release announcing the survey included as part of its headline: “Lack of awareness, chaos pervades with BYOD.”
The so-called “consumerization of IT” is an apparently unstoppable trend. And most businesses don’t want to stop it, because of the advantages that collaboration and social networking with mobile devices can bring to the enterprise. Still, increasing security threats could undermine those advantages.
Blake Turrentine, CEO of HotWAN and trainer at Black Hat, has been a penetration tester for more than 12 years. His continuing mantra is, “most everything you do on a smartphone can and may be monitored,” although he does qualify that by saying he believes Apple iOS devices that are kept up to date with the latest firmware are relatively secure.
Rachel Ratcliff Womack, a vice president with the digital security firm Stroz Friedberg, told The Bottom Line’s Herb Weisbaum on MSNBC that most people carry both business and personal information on their mobile devices. “It brings those two worlds together in a very convenient package for criminals to target,” she said.
And the damage malware can do is the same as on other devices: steal personal information, drain bank accounts and spy on users.
“[Yet] users may view these devices as eminently secure, when in reality they are just waiting to receive more attention from cyber criminals,” James Lyne, director of technology strategies at the online security firm Sophos, told Weisbaum.
In the face of these impending threats, multiple security surveys find both employees and employers appear to be relatively blase about them. SANS reported that only 9% of companies participating in its survey said they were “fully aware” of all the devices accessing their networks. Another 50% were “vaguely or fairly” aware. Nearly a third of the companies said they had no management policy for employee mobile devices.
Some of this may be inevitable. Turrentine says he doubts that enterprises can control their employees’ personal devices. “Users control their own phones,” he says, acknowledging that this is “a big [security] hole.” The proliferation of smartphones, alone with their ever-expanding capabilities means “the attack surface is expanded,” he says, noting that Apple devices are prized because of their cutting-edge functionality.
And he agrees that security is not the priority it should be at all levels — users, enterprise leaders and the manufacturers themselves. The pressure on the makers of devices is not for better security but more functionality. “They’re racing so fast to come up with more capabilities, because the mobile market is changing so rapidly,” he says.
Meanwhile, Mike Geide, senior researcher at Zscaler ThreatlabZ tells Network World that employees regularly try to bypass their companies’ security policies, even using anonymous proxy servers to get to unauthorized web sites.
Turrentine says even relatively savvy smartphone users seem blissfully unaware of the ways they are exposing their confidential information. He says he visited a Verizon kiosk in a shopping mall and talked to some of the workers there who were doing things like, “downloading questionable third-party apps and also doing online banking.”
The good news, he and others say, is that a solution is not terribly complicated. The best thing users can do is to make sure they have the latest versions of apps and the operating system of their device. Turrentine says the latest iOS is fairly secure, noting that it took the jailbreak community 10 months to break the iPad 2.
Beyond that, Lyne tells The Bottom Line that users should have a robust password, use encryption, and be very careful about what apps they install.
“Think before you download,” he says.
As I have stated in previous articles, the growing number of mobile devices in use today has created a new, and easier target for cyber criminals. Compounding this problem is the growing number of personal mobile devices being used in the workplace as they contain both personal and sensitive corporate data not protected and regulated by management.
The increasing popularity of iPhones and iPads in use is now making Apple products a mainstream target for the theft of your personal information.
Thanks for reading,
Rick for Security on iPad