Description: C:\Users\Gimode\Desktop\LOGO\CAK LOGO-01.jpg

National KE-CIRT/CC Cybersecurity Best Practice Guide Of The Week



In This Issue:

*    Mobile applications















How Mobile Applications can be Dangerous

Mobile devices are the most commonly used devices to connect to the internet. This has become true because of the emergence of mobile applications. Mobile applications can be install in mobile devices to add functionality. However, mobile applications can be dangerous  if not installed, configured and used securely. Recently, malicious hackers have been using mobile applications as a way of attacking cooperations. When the attacker’s application is installed in a device they can extract company information or propagate through the network until the find what they were looking for. It is therefore important to vigilant with how we install and use these applications.


How to Protect Yourself

*    Only install appplications that you need. The more applications you install, the more likely that one is malicious or vulnerable to an attack.

*    Only install well-known applications from trusted app stores. New or unknown applications may be developed by malicious people with the intent of infecting your mobile device.

*    Never download applications from websites that you are not familiar with.

*    Never install applications advertised by SMS messaging. These are usually nothing more than attempts by cyber criminals to fool you into installing their malicious applications.

*    During the installation of  mobile applications, be sure to check what permissions the mobile app is asking for. If the mobile application is asking for more than you expect, don’t install it.

*    Take your time to read about the developer of  the applications you want to install and determine if they are trustworthy.

*    Read the comments of the application to determine if there has been negative feedback on the application.

*    Use mobile security applications.

*    Avoid jailbreaking and rooting your mobile device.


Have the above security tips in mind when operating your computer systems. Report any cybercrime incident/activity

to /