NOT CONCERNED ABOUT THE STATE OF YOUR DEVICES’ SECURITY?
YOU SHOULD BE!
David Freidenberg CEO of the POMM Atlanta Georgia July 14th, 2016.
We all tend to protect our computers when it comes to security. We know that there is an amalgam of different security options available, such as Norton, McAfee and the like, or even free options online, but when we deal with our phones, we don’t think about the same security issues. Scammers, hackers, and many more digital criminals are always looking for ways that they can break into your smartphones, since they are not guarded half as much as our PCs and laptops/tablets. Some of the many security risks that your mobile phone poses are:
Your smartphones are not enabled with passwords and authenticate users. This lack of control enables others to hack into your private information.
Static passwords are the norm for mobile devices instead of the two-factor authentication process. This means that all of your digital transactions can be accessed by skilled hackers. Since the norm for mobile devices is wireless transmissions, this means that your device is susceptible to many attacks when it is not encrypted. Not to mention the vulnerabilities of the NFC (near-field communication system).
Many devices possess malware and any apps that are downloaded usually carry the same, since it is not a heavily regulated marketplace. It could even be disguised as a security app itself!
It is not a pre-requisite for mobile devices to be sold with security software and many do not know which to choose and utilize when they want to download. Security updates are also mostly late in their initial release to consumers, usually 2 to 3 months after, leaving your device at the whim of cyber criminals.
Firewalls are not utilized most of the time with mobile devices and this allows infiltration when connected to a wide area network.
Identity theft is a major problem for many users of mobile devices, causing harm to their credit scores and reputations. It’s much easier than you think! The drive-by mobile attack can easily access NFC. Here it is even more accessible than WiFi since they are no password or credential requirements! NFC connections are established automatically and do not require any form of login or password.
Now that we know the dangers our mobile devices can potentially be in, there is but one solution to the problem. As stated earlier, there are many risks as well as so called “security updates and apps” that are simply not so. Even if you do have some form of security, with smartphones it is just not that simple. The only true way to stay secure and keep your personal information and transactions safe is through POMMtm (Privacy-on-My-Mind). This is a revolutionary, new Israeli top technological solution that secures your phones from the smallest to largest of threats.
By utilizing a highly advanced biometry-based, user-enhanced authentication process, POMM privacy management solutions are the one-stop shop for all your smartphone security issues.
That’s understandable when you want to protect your data from fraudsters. But our privacy is at stake from every direction, not only ill-intentioned people may try to steal our data the government with a Big Brother like mentality “protecting us from terrorism” has taken liberties and violated our rights. The CIA, FBI, and NSA penetrating your iPhone without your permission. Researchers working for the Central Intelligence Agency (CIA) have worked for years to break the hardware encryption of Apple’s iOS devices, according to The Intercept, citing documents obtained from National Security Agency (NSA) whistleblower Edward Snowden. The NSA succeeded, in breaking the security of iPhones and iPads, and show cased their achievements at an annual gathering called the “Jamboree,” where security experts analyze security flaws in commercial electronics. By now we all are aware that on or around June 2013 the Washington Post reported about PRISM, a cooperation between the Federal Bureau of Investigation (FBI) and the NSA in which the NSA tap directly into the servers of leading American Internet companies. In September 2013, the New York Times reported that the NSA works with tech companies to break into encryption systems and build entry points into all smartphone companies’ products, and identify and break code maker to penetrate those and implement weaknesses into widely followed encryption standards. The Article revealed agency’s efforts to exploit the Secure Sockets Layer (SSL), virtual private networks (VPN), and the encryption used in 4G phones.
The NSA in 2015 successfully implanted malware on iPhones as part of WARRIOR PRIDE, a GCHQ framework for accessing private communications. The NOSEY SMURF enabled spies to remotely access and activate a phone’s microphone, while one called DREAMY SMURF enabled agents to manage the phone’s power system to avoid detection, PARANOID SMURF concealed the malware in other ways, and TRACKER SMURF enabled precise geolocating of a phone. All of this malware requires the sneaking of a backdoor into an app that the user has voluntarily installed. The FBI managed to break into the iPhone early this year. Apple chief executive Tim Cook recently stated, “None of us should accept that the government or a company or anybody should have access to all of our private information. This is a basic human right. We all have a right to privacy. We shouldn’t give it up. We shouldn’t give in to scare-mongering.” Hence, the only current solution is devices like the POMM. The POMM is a smartphone add-on device (a protective case with a hardware plus battery and storage) that allows its owner to store, download and deliver classified or personal data, such as medical, finance, and private photos, to/from emails, cell phones and the Internet in the most secured manner. Snowden’s lawyer, Anatoly Kucherena, stated, “Edward never uses an iPhone, he’s got a simple phone… The iPhone has special software that can activate itself without the owner.” The POMM can protect the iPhone as well.
POMM Creates a Secured Digital Safe attached to the smartphone, which is invisible to hackers and malware and is securely shielded from any exposure on the Internet or Public Cloud Applications.
POMM is comprised of a unique, miniature quad-core computer embedded in the smartphone case and accompanied by POMM Applications, such as Secured Messaging, Private Contacts, Secured Storage of Photos and Media, Secured Passwords and PINs, and more.
POMM returns the control of your data to you and protects you from falling victim to costly and embarrassing cyber-attacks.
POMM, compatible with all leading Android and iPhone Smartphones, is a necessity – not an accessory! If you try to separate the case from the smartphone without being the biometrically recognized owner, the data will self-destruct.
The POMM is raising capital for all of us allowing us to be a customer and a shareholder at the same time. www.pommoffering.com
POMM covers the security of your entire smartphone, including but not limited to:
Galleries and Images
Camera or Security Cameras
Messages and Emails
Visit www.pommoffering.com for more information!