Sunday, August 6, 2023 | 9:00 a.m. – 10:00 a.m.
Megan Bixler, APCO International
Cell phones have become a part of our daily lives. Routinely, we access important information, like bank information, contact, pictures, social media, emails. Cell phones also have information we don’t access, like health data, location information, browser history, and passwords. It is difficult to think about modern life without a smartphone.
Like most other technology, cell phones are vulnerable to cyberattacks. Cell phones are susceptible to several different types of attacks, but the threats that were discussed during this presentation were:
- Data Leakage
- Unsecured Wi-Fi
- Wi-Fi Interference
- Social Engineering
- Poor Cyber Hygiene
- Improper Session Handling
This session discussed the various types of attacks that cell phones can experience, methods to discover if your cell phone has been compromised, and prevention efforts for emergency communications centers (ECCs).
Submitted by Megan Bixler