Mobile devices are at the heart of our daily lives, seamlessly integrating communication, navigation, financial transactions, productivity tools, and even health care. Yet, this convenience comes at a price: The expansive set of applications and tools on devices expand the potential avenues from which a bad actor can compromise individuals, their loved ones, or their work. The security of our mobile devices is crucial to preventing fraud, data theft, and other malicious activities that have broader repercussions beyond someone’s personal life. Ensuring their security is not just a technical necessity but a fundamental component of a robust cybersecurity ecosystem.

The Mobile Device Security Landscape

Imagine a mobile phone as a digital extension of oneself. It holds personal messages, photographs, and videos; financial details and applications; health records; location data; and more. With increasing digitization, the rise of remote and hybrid work, and bring-your-own-device policies, the centrality of mobile devices in this ecosystem also means they are a gateway to organization data, making them prime targets for cyberattacks. The sheer amount of personal and commercial information stored on these devices makes them highly vulnerable, with the average phone holding $14,000 worth of data

Most owners do not think about the security of their devices and the reality is that they are not as protected as one may think. In fact, nearly 66 percent of respondents to a mobile security survey have reported they’ve felt pressure to “sacrifice mobile device security ‘to get the job done.’” The landscape of mobile device security is complex because of the variety of factors involved: hardware developers, software programmers, third-party software applications and their developers, telecommunications networks, and individuals and their behaviors. Vulnerabilities can arise at any of these stages in a mobile device’s lifespan. 

For example, mobile applications that are not developed with security in mind can expose sensitive information to malicious actors. These apps can leak or steal data, monitor user activities, and even control other connected devices in your home. Many mobile applications also collect extensive data on users, which can be monetized or used for other purposes, such as attempting to access or steal intellectual property and other sensitive information. Ensuring that user data is securely handled and stored is crucial to protecting user privacy and preventing it from being used in fraud, espionage, and other malicious purposes. 

Spotlight on SMS: Convenient, but Insecure

Short Message Service (SMS) is a perfect example of how technology, while revolutionary, can also be a double-edged sword. When SMS was developed in the 1980s, it was intended for telecommunication companies to communicate with subscribers. It evolved to include user-to-user communication with the introduction of mobile keyboards. However, SMS was never designed with security in mind. For instance, it lacks encryption and user authentication, making it inherently insecure. Encryption is crucial because it converts information into a code that prevents unauthorized access during transmission, ensuring that only the intended recipient can read the message. User authentication is equally important as it verifies the identity of the sender and receiver, preventing unauthorized users from gaining access to sensitive information. Without these security measures, SMS is vulnerable to interception, spoofing, and other forms of cyberattacks, putting users’ personal and financial data at risk.

This insecurity is not just theoretical. Malicious actors exploit these vulnerabilities through techniques like Subscriber Identity Module (SIM) swapping, where an actor convinces a telecom provider to transfer a phone number to a new SIM card. Now they can intercept messages, including two-factor authentication (2FA) codes. Usually in conjunction with additional personal information they have on someone (e.g., name, email address, home address), they can also gain unauthorized access to accounts to conduct fraud, or gain access to sensitive data. In March 2024, millions of 2FA codes for services like Google, WhatsApp, and Facebook were leaked online, exposing the risk associated with using SMS for critical security functions. Hackers intercepted these 2FA codes, allowing them to gain unauthorized access to user accounts. This incident highlighted the urgent need for more secure alternatives to SMS for authentication purposes, such as app-based or hardware-based 2FA, which offer better protection against interception and spoofing attacks.

In addition to SIM swapping as a threat vector, the lack of encryption of SMS messages is also a core vulnerability. Malicious actors can easily intercept and read messages sent via SMS. This vulnerability underscores the need for more secure communication methods. Developers are working on a more secure alternative to SMS, Rich Communication Services (RCS), which can better support end-to-end encryption, file sharing, and improved messaging capabilities. Using a more secure messaging system like RCS could streamline communication security and features across platforms

Policy and Industry Solutions: Addressing Longstanding Issues

The security issues associated with mobile devices have been around for years, but we can improve the situation through a multi-faceted approach. Below, we outline a non-exhaustive list of considerations to foster a more robust and secure mobile device ecosystem.

Secure-by-Design and Secure-by-Default, Paired with Incentives: Secure-by-design principles prioritize security during the design and development phase of software and hardware, where developers prioritize the security of customers as a core aspect of their products. Secure-by-default principles means that a product is as secure as possible by default, without needing additional security configurations. Both of these principles can mitigate risks before products reach consumers. This approach shifts the burden of security from end-users to developers, who have the resources and expertise to address these challenges effectively.

Providing incentives for developers to prioritize security can further drive significant improvements in security. These incentives can include financial rewards, recognition programs, and regulatory benefits for companies that adhere to high security standards. The implementation of Executive Order 14028 and the National Institute of Standards and Technology (NIST) Secure Software Development Framework are steps in the right direction and how organizations will respond to it remains to be determined.

Cyber Trust Mark: The Federal Communications Commission has proposed a Cyber Trust Mark program, allowing manufacturers and retailers to apply a “Cyber Trust Mark” logo to products that meet established cybersecurity criteria. This logo aims to help consumers make informed decisions about the relative security of products they choose to bring into their homes. Given that mobile devices are frequently targeted by cybercriminals due to their vast amounts of personal and financial data, expanding this program to mobile devices could significantly enhance consumer confidence in the security of their devices. By making it easier to identify products that adhere to stringent security standards, the program could reduce vulnerabilities and protect users from potential cyber threats.

Consumer Education: Educating consumers about cybersecurity risks and best practices is crucial to improving security conditions. While many users are unaware of the vulnerabilities associated with their mobile devices and lack the knowledge to protect themselves effectively, others compromise on security for reasons such as convenience (44 percent), saving time (39 percent), meeting an urgent deadline (24 percent), or to save money (19 percent). Seventy-one percent of working adults admitted to taking risks on their devices, such as “reusing or sharing a password, clicking on links from unknown senders, or giving credentials to an untrustworthy source.” As NIST emphasizes, the use of secure messaging apps, enabling multi-factor authentication, and regularly updating their software can significantly reduce vulnerabilities. But this must also be paired with a security mindset from end users. 

The cybersecurity risks associated with mobile devices are a pressing concern that requires a collaborative and comprehensive approach between consumers, industry, and government. Consumers can be aware of threats and use their buying power to influence the direction of mobile device development. Industry can adopt secure-by-design principles and implement robust security measures from the outset. Governments can facilitate adoption of these principles through incentives and harmonize existing standards. The path forward may be challenging, but with concerted efforts and a commitment to security, we can mitigate the risks and harness the full potential of mobile technology safely and securely.

Get the latest cybersecurity policy research and analysis in your inbox. Sign up for the R Street newsletter today.