The last two decades have sparked an Internet Age where digital devices have become ubiquitous in our lifestyles. A growing portion of modern interactions are being done through mobile phones. Ever since the debut of the iPhone in 2007, smartphones have dominated the mobile market. In just the past 5 years, we have seen other competitors crop up, including platforms like Google and Windows and manufacturers like HTC, LG, and Samsung to dip into the Apple-dominated market. As a consequence, there has grown a large amount of variation in hardware and software. However, the sudden burst in this market has meant that software and hardware may be released before proper considerations. Consequently, the issue of security has not moved fast enough to match the growth of mobile systems. For example, PCs are very similar to phones, but have an assortment of security features available to users. Robust antivirus software protect users on PCs; however, these are not available on mobile devices. For example, AVG Antivirus for Android only scans the SD card portion of phones while AVG Antivirus for PC scans program files as well. AVG Antivirus is not available on Apple iOS devices at all. The need for security and antivirus software has grown, as an increasing number of individuals have used mobile devices for personal finance and other sensitive information. In the future, a tangible move must be made to protect user data on mobile phones. Data breaches on mobile devices are occurring right before our eyes. Apps can, and frequently do, ask for unwarranted access to private data. The most egregious examples of this include the highly publicized collection of location data by simple flashlight apps that only require access to the camera. Even popular apps such as the popular “Angry Birds” franchise have asked for unnecessary permissions. An experiment has shown that denial of access to location services in Angry Birds breaks its functionality, and renders the game unusable (Leonard). Breaches can occur behind the scenes as well. Passwords are stored in an encrypted file deep in the system data of a phone. If encryption is broken, personal information can be discovered and compromised. Autofill and GPS settings are also a potential danger that are stored (and can be compromised) in the same way. It is up to the user to ensure that their logins and passwords are safe by only providing access to reputable browsers and apps. To take matters into their own hands, many users are using third party software to protect their data. For example, CyanogenMod is a third-party operating system that can enhance security. Notable features include WhisperPush software that encrypts text messages (a tool missing in stock Android), the ability to individually block certain app permissions, and the ability to install effective ad blockers (“Features”). However, caveats of using CyanogenMod include the fact that all personal data can be accessed when the phone is connected to a computer. Furthermore, users must trust CyanogenMod Inc. with their private information. Solace to some, in the past there has been no evidence of criminal data collection, and the opensource nature of CyanogenMod allows any programming-literate individual to confirm that its code is not dangerous. To further build on the legitimacy of Cyanogenmod, it has recently joined in a hardware business venture with OnePlus, a subsidiary of the reputable Chinese company OPPO. In the future, both first party and third party operating systems will address these issues, but in the meantime, there are few alternatives. The problem today is that very few people use third party alternatives. Alternative operating systems have less than 0.7% of the market share. As a result, it is Apple and Google’s responsibility to push for greater encryption, who together have 96% of the market share (“Smartphone OS Market Share”). The NSA has requested backdoors to mobile security for government use, causing uproar in the media. In direct opposition to their requests, Apple and Google have discussed turning encryption settings automatically on instead of automatically off. Encryption is not available on Apple devices, and only available on Android devices in hidden developer settings. While a concern to some, current data-mining and identity theft methods rely on sophisticated tools such as Tor and IP, which are tracking much more powerful than anything on a phone. As a result, encryption of consumer devices should not affect national security. Encryption in the future should be taken for granted. The best that individuals can do today is use Android devices and utilize developer settings. In the future, automatic “on” features should be instituted, and be more available for casual users. Instead of sharing data for personalization, individuals should be able to personalize data shared. In all, a world with greater personal security is a world with greater total and national security. 796/800 words Works Cited "IDC: Smartphone OS Market Share." Www.idc.com. IDC, n.d. Web. 12 Nov. 2014. Leonard, Andrew. "Angry Birds, Tracking Device?" Saloncom RSS. Salon, 18 Jan. 2013. Web. 13 Nov. 2014. "Features." CyanogenMod. CyanogenMod Inc., n.d. Web. 13 Nov. 2014.