• Skip to main content
  • Skip to primary sidebar
The Loadout Room

The Loadout Room

Professional Gear Reviews

Hardcore Gear and Adventure

Menu
  • Shooting
        • Pistol
        • Pistol Accessories
        • Rifle
        • Rifle Accessories
        • Shotgun
        • Machine Guns
        • Air Guns
        • Ammunition
        • Optics and Sights
        • Weapon Lights
        • Tips & How-To
        • Concealed Carry
        • Holsters
        • Suppressors
        • Precision Rifle Shooting
        • Firearms Training
        • skorpFull-Auto Fun — Shooting the full-Auto vz. 61 Škorpion
        • p320-full-leftSIG Sauer M17/M18/P320 Pistol Just Can’t Seem to Escape Safety Controversies
        • TISAS_10100520_1__98179Tisas 1911A1 U.S. Army Review: Best Budget .45 ACP WW2 1911 Clone?
        • Photoroom_20250531_143432Pyramyd AIR’s Springfield Hellcat Pro CO2 BB Pistol Is the Ultimate Dry-Fire Trainer
    • Close
  • Gear Reviews
      • Mission Gear
      • Camping Gear
      • Survival Gear
      • Medical Gear
      • Adventure & Travel
      • Knives & Tools
      • Overland
      • Disaster Preparedness
      • Footwear
      • Womens Gear & Clothing
        • Hunting in TexasThese 5 ATV Dealers Will Get You Ready For Hunting Season in Texas
        • ac65a540-2ef3-4598-8d11-afdf53f46e94.__CR0,0,970,600_PT0_SX970_V1___Streamlight ProTac Rail Mount HL-X: A Thoroughly Bright Review
        • Bluetti 2 handsfree power backpackBluetti Handsfree 2 Review: The Ultimate Power Backpack for Off-Grid Adventurers
        • The Gallagator 10 day pack on the shoreline next to a hiking trail.Day Pack – Mystery Ranch Gallagator 10 – The Best Yet?
    • Close
  • Men’s Lifestyle
      • Fitness
      • EDC
      • Eyewear
      • Watches
      • Electronics & Technology
      • Downtime
      • Mens Clothing & Accessories
      • Manly Skills
      • Style & Grooming
      • Gentleman Drinks
      • Crate Club
        • Tom and Blake Sell TeaHow Sasquatch Tea Is Revitalizing a Stagnant Tea Market With Veterans and Outdoorsmen in Mind
        • redcat-blackwidow-articleheaderWar of Words: In the Ultra-Competitive Defense Tech Industry, Storytelling is a Secret Weapon
        • Photoroom_20250525_074933Juggernaut Tactical Frame Review: The Best Upgrade for Your 365
        • craft holstersCraft Holsters Makarov Tuckable IWB Holster Report
    • Close
  • News
  • Video Demo
  • Buying Guides
  • Shop
  • Advertise
Op-Ed

Cyber Security: Protect your mobile device | Part 1 | iPhone

April 6, 2017 by Richard Moore Leave a Comment

Cyber Security: Protect your mobile-self | Part 1 | iPhone

Mobile is the modern digital platform of choice in many parts around the world. Sure, there are folks that still have traditional desktops, or slim designed brand new laptops, but the-go-to device; is the smart phone. My preceding article on cyber security provided you with the first steps in getting a password manager. I would suggest that you also use the advanced features on your iOS device. Use a complex password that you generated from your off-phone Password Manager, and use that with the finger print authentication, for plausible deniability. By doing this step, it will make you think twice about what you’re installing and upgrading (I have no idea what my mobile password is and would have to go to another machine to retrieve it). It also makes it difficult in the event your phone is lost and nefarious individuals try to use the variety of activities to guess your mobile password. Oh yeah, don’t forget to set the phone to destruct after five-bad password attempts to really piss off those black-hearted actors and wipe your personal information from the phone.

There are so many mobile platforms out there so, I will be addressing to two most popular in separate articles; iPhone (iOS) and Android. As part of my occupation, I was provided the opportunity to perform security testing and business functionality on the initial batch of iPhones in 2007. The preliminary thing I noticed even back then was that the platform was designed with security concepts in mind. For those of you in the military, or those that love military movies; think about the concept of a firebase (One of the best USMC movies out, is The Siege of Firebase Glory; starring R.Lee Ermey). The idea is that most important section that they were protecting was the internal center of the firebase. This is where the “Colonel” would be located, similarly the iOS “kernel” sits at the center to direct actions; it also needs protection. iOS built the security in both; how the hardware works collaboratively with the software. No other popular device has integrated the hardware and software with security built-in. So, without going into the super nerd stuff on how they do it, let’s talk about that you have a secure mobile device to start. How do you protect yourself while doing things that smart phones were made to do?

You might have seen the rash of ransomware (malicious software/applications that will seize control of your device and restrict you from using it the way you want. It also requires a ransom payment to regain control). How does this happen and how can you securely protect your device? Well if you didn’t know your smart phone does all kinds of things behind the scenes; like downloading apps, installing apps, locating your GPS coordinates, etc., all the while trying to connect to the best signal available. Many times, your phone will connect to a WiFi hotspot without your knowledge.

For example, if you have AT&T as carrier, your phone will connect to an AT&T WiFi hotspot automatically. You can stop this by forgetting the AT&T wireless hotspot and selecting “Ask to Join Networks.” A good first step in ensuring you don’t connect to a WiFi location you don’t want. To increase the security of connecting to WiFi hotspots you will want to get an application such as SkyCure or Trend Micro. These technologies, protect your phone from incoming and outgoing connections and identify malicious applications. Additionally, they can funnel traffic through bad networks securely using Virtual Private Network (VPN) tunneling. For example, you are at the British Airways lounge, and you’re attempting to submit a form over secure protocols for your next flight. The BALounge and many other hotspots will attempt to decrypt your traffic and read what you submitted. Skycure, can create a VPN tunnel to securely transmit your personal information without being decrypted (in many cases). It also will inform you if there is anyone scanning or attempting to target your phone and prevent those attacks similarly to your firewall at home.

Cyber Security: Protect your mobile-self | Part 1 | iPhone

The next three applications you will want to have on your phone to make your connections private, is a Virtual Private Network (VPN) service and a Secure Browser. These two are a must when you want to remain private and anonymous when connecting to the Internet via your mobile device. The third is to make secure your text-messaging activities. First, I would recommend a VPN service; this will anonymize your activities such as email and web browsing. I personally use HotSpotVPN it is a paid service, but I can use iOS natively, or push all my normal browser traffic through it (i.e., Safari or Google) to reduce my GEO location tracking that websites seem to want. If I really want to go anonymous, then I will launch RedBrowser.

RedBrowser is a bundle that leverages The Onion Router (Tor) network and a built-in web browser, so you do not have to install and connect manually and apply all the appropriate proxy settings. The core principle of Tor, “onion routing,” was developed in the mid-1990s by United States Naval Research Laboratory, with the purpose of protecting U.S. intelligence communications online. Onion routing was further developed by DARPA in 1997.

Cyber Security: Protect your mobile-self | Part 1 | iPhone Cyber Security: Protect your mobile-self | Part 1 | iPhone

The final item you will want, is secure text messaging with auto destruct features, so in case you are habitual text’er when you have one too many and added some ridiculous looking “selfies” they would be gone by the time your hangover is done. I recommend signal; it has these features as well as encrypted cellular communications, in the event your fingers are broken and just want to go old school.

Cyber Security: Protect your mobile-self | Part 1 | iPhone

There are many further activities that you might want to research to protect your iOS a device. This article was an attempt to provide you with some concepts that you will need as you get more attached to your smart phone and less to your laptop. If you do one thing, don’t jailbreak your iOS; you’ve just let the bad actor in the front door.

Concepts can be broken down into these items for further research to find the best for you:

  • Mobile Device Protection – something to protect your mobile device from malware and attacks through signals (i.e., Wi-Fi, Bluetooth, NFC, Geo Location, etc.)
  • VPN and Secure Web Browsing – something to protect your internet traffic and communications
  • Secure Messaging – something to protect your texting, sms, etc., from yourself, and prying eyes.

Share This

About the Author

Richard Moore Rich Moore is a currently a Cybersecurity Executive and travels OCONUS frequently. He served 15 years in the Marine Corps in the following MOS(s) 0351 Infantry Assaultman, 8531 Primary Marksmanship Instructor, 8111 CRRC Coxswain, 8151 Marine Security Guard (Department of State, U.S. Embassy), 0291 Intelligence Chief. Besides his current work that is subsidizing his gear buying hobbies, he is also an NRA Instructor.

See All Richard Moore Articles

More From The Loadout Room

Comments

Primary Sidebar

Most Read

  • Mossberg 930: the affordable 12 gauge auto-loader
    Mossberg 930: the affordable 12 gauge auto-loader
  • M4A1 Block I: The Special Operations Origins of an American Icon
    M4A1 Block I: The Special Operations Origins of an American Icon
  • Breek Arms Sledgehammer: The AR-15 Charging Handle That Gas Can’t Touch
    Breek Arms Sledgehammer: The AR-15 Charging Handle That Gas Can’t Touch
  • Pyramyd AIR’s Springfield Hellcat Pro CO2 BB Pistol Is the Ultimate Dry-Fire Trainer
    Pyramyd AIR’s Springfield Hellcat Pro CO2 BB Pistol Is the Ultimate Dry-Fire Trainer
  • War of Words: In the Ultra-Competitive Defense Tech Industry, Storytelling is a Secret Weapon
    War of Words: In the Ultra-Competitive Defense Tech Industry, Storytelling is a Secret Weapon

Find Us on Facebook

Recent Comments

  • Winston Smiths on Mossberg 930: the affordable 12 gauge auto-loader
  • Jared Mize on The Fairbairn-Sykes Fighting Knife: A Commando Blade That Changed Special Forces Forever
  • GomeznSA on MAC-10: The Wild History of America’s Most Iconic (and Overrated) Submachine Gun

Latest From SOFREP

Military History

What Would Alvin York Carry Today?

Op-Ed

The Bolduc Brief: The Complexity of U.S. Policy Toward Iran – Lessons from History and Strategy

Military History

Robin Olds: The Maverick Ace Who Redefined Air Combat

World

SOFREP NewsFlash: Iran, Trump, Putin, Ukraine and the War in Gaza

Military Content Group

© Copyright 2025 Military Content Group · All Rights Reserved.

  • Privacy Policy
  • Terms of Use
  • Advertisers
 

Loading Comments...