27 November 2015

Identity Theft Expert

Robert Siciliano - IDTheftSecurity.com

662Posts 1,617,706Views 62Comments

How Does Jailbreaking Or Rooting Affect

28 July 2012  |  2369 views  |  0

You may have heard the term jailbreaking or rooting in regards to your mobile phone, but what is this and what does it really mean for you?

Jailbreaking is the process of removing the limitations imposed by Apple and associated carriers on devices running the iOS operating system. To “jailbreak” means to allow the phone’s owner to gain full access to the root of the operating system and access all the features. Similar to jailbreaking, “rooting” is the term for the process of removing the limitations on a mobile or tablet running the Android operating system.

Jailbroken phones came into the mainstream when Apple first released their iPhone and it was only on AT&T’s network. Users who wanted to use an iPhone with other carriers were not able to unless they had a jailbroken iPhone.

By hacking your device, you can potentially open security holes that may have not been readily apparent, or undermine the device’s built-in security measures. Jailbroken and rooted phones are much more susceptible to viruses and malware because users can avoid Apple and Google application vetting processes that help ensure users download virus-free apps.

It is inevitable that over the next few years, as millions of smartphones replace handhelds, laptops, and desktop PCs, and billions of applications are downloaded—risks of mobile crime will rise. Not only do you need to stay educated about the latest threat and scams, you should also make sure you havecomprehensive mobile security installed on your mobile device.

And remember, jailbreaking or rooting your mobile device can open you up to security risks that don’t make it worth doing so.



TagsSecurityRisk & regulation

Comments: (0)

Comment on this story (membership required)
Log in to receive notifications when someone posts a comment

Latest posts from Robert

Nineways to shop safely on Cyber Monday

24 November 2015  |  577 views  |  0  |  Recommends 0 TagsSecurity

What are Bug Bounties?

20 November 2015  |  1337 views  |  0  |  Recommends 0 TagsSecurity

Medical Identity Theft can be deadly

18 November 2015  |  235 views  |  0  |  Recommends 0 TagsSecurity

The World's First Biometric Password Lockdown App is here

17 November 2015  |  414 views  |  0  |  Recommends 0 TagsSecurity

Best practices for BYOD data storage

16 November 2015  |  1155 views  |  0  |  Recommends 0 TagsSecurity

Robert's profile

job title Security Analyst
location Boston
member since 2010
Summary profile See full profile »
Security analyst, published author, television news correspondent. Deliver presentations throughout the United States, Canada and internationally on identity theft protection and personal security....

Robert's expertise

Who's commenting on Robert's posts

Ketharaman Swaminathan
Michael W
Dirk Kinvig
Ulrich Rosenbaum
Revinia Curry
Balasubramaniam GD
Matt Scott
Bjorn Soland
Prasenjit Das
John Serocold
Charmaine Oak
Iain Montgomery