• Adam Adler

Adam Adler: Mobile Threat Defense? There's no such thing as an unhackable phone!



Adam Adler ( Miami, Florida): Every attack costs money and time. By making sure your security is not compromised by a single person, place, datacenter, or provider, you’re raising the cost for the hacker. For the attacker, a diversified security system translates into cracking multiple encryption algorithms, firewalls, etc. The rule is clear: make a potential hack as expensive as possible.

One of the things that really bothers me is when companies claim that their product or solution is unhackable. In this blog, I'll tell you why that's utter nonsense.


People definitely don't get what they have been promised, which is logic because products or solutions that provide 100% security don't exist.

The people that buy these products are the ones that understand the real security risks the least. Blindly trusting (the wrong) solutions can have nefarious consequences. Even financial ones if for instance the funds from your "unhackable" Bitfi get stolen.

It's a shameful practice to abuse people's lack of understanding to sell snake oil.

By claiming that something is unhackable you might not only attract security researchers but also people with malicious intentions might be eager to prove you wrong.

Claims like unhackable or 100% secure should be a red flag. There's no such thing. I will not buy or use products and solutions that make these claims because it's utter nonsense. I hope you'll be very critical when you see something like this. Don't blindly believe all the buzzwords that are used on marketing websites or video commercials.

DigitalBank Vault Encryption solutions are extremely safe but we will never issue a statement saying that they are unhackable.

They may be hacked, just because the user didn't follow the instructions, just to give you an example.

With cybercriminals increasingly targeting mobile devices (such as with malicious apps and phishing schemes), threatening both the consumer and enterprises, the market is rushing to provide solutions to mobile security threats. Gartner calls this Mobile Threat Defense.

In addition to bad apps, we are seeing an increase in the number of criminals, hackers, and hostile governments willing to pay for zero-day mobile exploits. These silent and secretive threats can take over your mobile phone simply by sending you a text message or email with a link to a malicious website. Unfortunately, new security threats and hacks are typically found after successful attacks have been reported by victims, researched and a fix is created by programmers. A hack may affect thousands or even hundreds of thousands of people before it is detected and fixed.

And what about those Wi-Fi networks we rely on when in airports and at hotels? Make no mistake, they often spy on our communications. The so-called “captive portal,” where you have to enter your hotel room number, or just click on terms of service agreement, are often traps to capture your email, passwords, and web browsing activities. Be vigilant about which networks you connect to while traveling. If you receive a warning when connecting to a new Wi-Fi network, do not click “Continue.” Try another network.

All of these issues make it impossible for a single device to be completely secure. Organizations need mobile threat defense security tools that will protect the enterprise as employees connect their devices to malicious networks and download questionable data-stealing apps around the world. Consumers need to be vigilant before downloading apps (read and confirm permissions are in place), be wary of text messages from unknown sources, and only join known and trusted Wi-Fi networks.

And hang up on the hype of an “unhackable phone.”