Security News > 2020 > February > Don't be like Bezos: How to keep your phone from being hacked
Always stay alert to potential security attacks on mobile devices.
Aaron Turner, president and chief security officer of Highside, a distributed identity and secure collaboration technology company, said hardened Android devices are preferred over iOS devices, because iOS devices rely on a single-point-of-failure security model and don't allow users to select which encryption roots their device trusts.
Turner explained, "In our own research we have shown that it is conceivable that the roots of trust pre-installed in all iOS devices can be a very fertile ground for attacking mobile devices in the way that the FTI Consulting report outlined. It is also very convenient that Apple does not allow for third party monitoring of their devices or operating systems, allowing attackers to completely remove any forensic evidence by merely forcing a shutdown of the device, with nearly all evidence destroyed once it is finished rebooting."
If the device is incapable of installing the latest updates, purchase a new device.
Walsh said, "The Jeff Bezos phone hacking incident highlights the susceptibility of mobile devices to attack and is a reminder that anybody can potentially be victimized no matter which device they use or how safe they think they are. The problem with this kind of attack, is that the victim is caught unaware by the fact that it is one of their genuine contacts that is attacking them."