Wireless and Mobile Device Attacks Wardriving Jamming Common attack vectors Compromised credentials Rogue Access Points Application and Web Attacks Evil Twin Access Points Rootkit Weak and stolen credentials Packet capturing and sniffing Keyloggers Malicious insiders War shipping Watering Hole Attack Misconfiguration Bluetooth Exploits Drive-by Download System vulnerabilities Malware Malvertising Malware Phishing Website spoofing Insecure connections Securing Mobile Devices Causes of Internal Threats Lock the device when not in use Securing Application Employee sabotage Use secure applications e.g and Websites WhatsApp Unauthorised access Patch and update software applications Update your device Weak cybersecurity measures Regularly scan the device for malware Do not connect to public Wi-Fi Accidental loss or disclosure of data Visit secure websites with HTTPS Install an anti-virus software Damage to computer equipment from fire, connections Protect device using patterns, flooding, power loss, or terrorism. Use two-factor authentication tools strong passwords or fingerprint Use safe browsing tools, e.g AVG Secure Browser