These days, consumers are well aware of the software landmines that lay waiting to infect our smart phones, tablets, desktop computers and laptops.   The concept of security and that the same computer viruses can infect our mobile devices, though, isn’t one that crosses our minds nearly as often. As smart phones and tablets continue to find ways to become more and more useful, so are they increasingly competing with the functionality of the everyday computer. Just as many of us are comfortable transacting money online, for example, smart phones and tablets are inching into the same space in the form of mobile banking, secure data transfer, protection of Intellectual Property and so on. But in doing so, that begs one critical question: How secure and trusted is it to use your mobile devices for these delicate processes ?

Moreover, what threats today are jeopardising the security of mobile banking and what’s out there to combat it ? An increasing number of malware and spyware applications are targeting mobile users and are able to log every key typed, message sent or received and data within mobile banking or trading software. The scary part is almost none of these devices have anti-virus, encryption or other endpoint security tools installed. There’s spyware that can intercept communications or turn a phone on, too.

However, on the other side of the coin, many governments are familiar with spy software for mobile devices.  In 2003 and 2004, the FBI used cell phone spy software to eavesdrop on the conversations of organized crime families in New York, and it used those conversations in its federal prosecutions. Federal agencies rely on spying technologies to monitor suspected criminals, and they say private citizens are now using the technology, too.  The key is being vigilant and knowing how to protect yourself.

But just how far one needs to be independent and yet protect its privacy against eavesdropping and monitoring devices such as deploying additional measures and encryption over their mobile devices ?  Will this be a threat to national security when the same technology is being used by organised crime or terrorists ? It remains a delicate issue for many governments around the world. Will tough enforcements and laws being introduced against the use of security technologies infringe the heavily abused term called Human Rights & Privacy ?

Is there really a The Best Answer to all these complexities ?