Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Security risk associated with mobile devices
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Security risk associated with mobile devices
Cyber Crime and Smartphones In this new age era of smartphones and cellphone technology, there exists an open market for crime. Cellphones have become more like handheld personal computers. They store vast amounts of personal and financial information. Hackers and thieves alike can gain access to your personal and banking information, or infect your phone with a virus or spyware. In the past 8-10 years, cellphones have become much more than communication devices centered on placing telephone calls or texting. Today people use cellphones much as they would a personal computer. Cellphones have gone from simple devices without screens to powerful devices capable of sharing media, watching movies, surfing the web, and participating in social media. …show more content…
Because of all of the features and the use of multiple avenues of connection from 4G and Wi-Fi, to near field communications, it is becoming more and more important to have tighter security measures in place on smartphones. It has been reported that hackers have developed technology that costs approximately $1000.00 and is the size of a laptop that mimics a legitimate cellphone tower and is able to hack into your smart phone and not only steal data but infect your phone with programs allowing them to control the features of your phone. Many people download applications for their phone never paying attention to all of the permissions that they give the application. From seeing everyone in your contact list, your photos, your media, your location history, and your text messages, to what Wi-Fi you access. It is quite disturbing to know that someone has access to all of this information and even has the ability to turn your camera and microphone on and off at their leisure. Things as innocent as photographs shared on social media can provide information for criminals to use. Smartphones can tag your photographs with metadata that can include things such location, …show more content…
Imagine what can be done with the near field communications. At a recent security conference it was shown how an innocuous application could be downloaded that is imbedded with a Trojan Horse application that starts to look at the area around the smart phone for any credit cards. Once the card or cards are located, it will message the attacker on their smart phone and transfer the data. Once the attacker has the data they only need find a Point of Sale machine to complete the transfer of the money. Now take into account how often your wallet and smart phone are in close proximity to each other and the estimate that there will be over 500 million near field communication payment users by 2019. I think most people can see how enormous a problem this has the ability to be. Now stop and consider the other nefarious uses of near field communication. Not just financial ones. Near field communications are also used by some businesses for time keeping for people to clock in and out of work. They are also used to allow access to secure areas instead of physical access control. In a recent Forbes article it was reported that a former U.S. Navy Petty Officer had injected a chip,
Protection methods for your mobile phone or smartphone are important to help protect it from attacks. Activate encryption and remote wiping capabilities. Use the same security methods for email and text messages that use the same protocol as computers.
According to Rosen, the main reason why people acquire a cell phone is because of security. After the tragic event that occurred on September 11, 2001 in the United States cell phones started to play an important role in our lives. Rosen states that after this e...
In this micro-study, I will use tools and information available to the public via internet in attempt to hack the iPhone. Currently the iPhone is only sold to subscribers of the AT&T telecommunication service provider and all applications and updates are installed using Apple’s iTunes software. Using various resources I will focus the two main issues which have put Apple and the iPhone user community into the limelight. First, the “unlocking” of the iPhone, which bypasses the iTunes activations process and allows the device to be used on any SIM (Subscriber Information Module) card cellular phone service provider other than AT&T, in this micro-study I will be using a T-Mobile SIM card. Second, I will attempt to “jailbreak” the device, which will allow me to install third-party applications through underground sources and not directly from Apple. As I attempt to hack the iPhone, I will compare drawbacks and benefits of hacking methods, ease of use, and verify Apple’s claims on affecting functionality and possible damag...
Across the nation, people use cell phones daily to interact and communicate socially with each other. Unbeknownst to the average cell phone user, 4 billion people worldwide use cell phones daily. According to an article from ABCNews, people check their phones one hundred fifty times a day. People are not just using the cell phone for messaging or voice calls, but they are also mainly taking and sharing photos with them; 500 million photos are shared each day through social media such as Facebook, Twitter, Instagram, and Snapchat. Apparently in our country, fifteen percent of Americans admit to sharing most or everything online (ABCNews). All of these statistical facts prove that ...
Millions of people all around the world are using Smartphones, like iPhones, which turns out to be crucial part of our lives. We are using them not only for calling but we also store unbelievably huge amount of personal information. We have there all our contacts, calls and messages and all our pictures that we save and keep in the phones. A
Swartz and Allen both offer valuable perspectives on expectation of privacy and legal limitation of cell phone data tracking use. As consumers of technology, Americans use cells phone not always by choice, sometimes by necessity. Both authors advise us to question our stand on the government’s unwarranted involvement in our lives. I would encourage us all to be aware of all technology around us. Albeit convenient, we must be willing to accept our part in its use.
Over the past few years, technology has grown to be the driving force in human productivity and efficiency. Technology has been incorporated into our everyday lives to help us perform daily activities and bridge long distance communication. Although technology has brought us many advantages, it has also created quite few ethical issues along the way. Some of the biggest ethical issues technology has created revolve around cell phones. These issues include cell phone tracking and using the cell phone to cheat. Cell phone privacy can be compromised in many situations regarding phone call tracking and messaging. Cell phone use is also starting to be abused by students and other test takers to cheat on tests. Even if the person has good moral standards, sometimes the right decision to make is not always clear.
Many people in today’s society rely on technology to help us with our daily lives and help us stay connected to family, friends, and other people. The advancements in today’s cell phone technology is very complex and made to be efficient for their owners, allowing them to surf the net and IM message people instantly. Cellphones in particular have developed very fast in the past 15 years. From my childhood, cell phones have evolved from the old school Nokia bricks that allowed texts, calls, and simple graphic games, to todays I-Phones that have higher computable capabilities than some computers. In the United States alone, there is an estimated population of around 297 million people, and 197 million people are subscribed to cell phone companies (Starr). With so many people in today’s society with so much power and opportunity in the palm of their hands, we shouldn’t forget that “With great power comes great responsibility” –Voltaire.
Cell phones have become a part of mainstream culture. Recently they have become more affordable and accomplish much more than making and receiving calls. Along with the growing popularity there is also growing concerns about safety and health. In this paper we will address cell phone history and how they have evolved. We will discuss health concerns such as tumors and talking while driving. Finally, we will talk about all of the technology that cell phones can accomplish such as receiving Email and buying stocks.
Gralla, Preston. "Smartphone Apps: Is Your Privacy Protected?" Computerworld. N.p., 7 July 2011. Web. 22 Apr. 2014.
Since 2008, the smartphone, a device that combines a normal cell phone with a computer, typically offering Internet access, data storage, e-mail capability, etc. all in your hand was deemed as ground-breaking technology and created one of the largest and most competitive markets in terms of technology to date. Their increased popularity continued to grow and today, it is very hard to encounter someone without a smartphone. These devices allow people to disconnect from reality and grant them access to the world as a whole. People use these devices to manage their daily routine, dictating what they should do and when they should do it.
Perceptions of the security and privacy in the new era of technology are reflected in how users handle their personal information on a daily basis in relation to their electronic devices and services. People are less willing to input sensitive information such as their social security number or financial credentials into a mobile device as opposed to a laptop computer, many citing security concerns as the reason why they did not want to input the information (Chin et al. 4). The public feels that their private and sensitive information cannot be protected by the security systems of their smartphones. As a result, they dictate their actions with their electronic devices in order to manually preserve and protect their digital
In today’s world the vast majority of the population owns a cell phone. Cell phones are a huge part of people’s everyday lives. Since the 1940’s when mobile phones became available for automobiles, phone companies have made huge strides in making mobile phones more efficient, much smaller, and more available for anyone to use. There was a time where only people of wealth had these types of mobile phones. Now people from all social classes own a cell phone. They are extremely convenient and have the ability to do just about anything you can think of. There is an “app” for everything. You can make phone calls, text message, surf the web, pay your bills, read books, catch up on social media, and even listen to you music all from one small handheld device. Cell phones play a huge role in today’s economy. Businesses such as AT&T, Verizon, and Sprint have become huge public corporations with large stakes in the stock market. Between these companies among several other phone companies they have created millions of jobs and opportunities. Cell phone companies have now created what are known as “smart phones”. These phones are typically slim and sleek and have countless versatile abilities. However, cell phones have not always been so “smart” or small for that matter.
Cell phones are progressively becoming more accessible and reliable as days go by in such a way that creates a safer and protected environment around us. The many ways and situations one can use a cell phone is becoming more free and diverse than what phones were intentionally made for, that is, to communicate through speech. Cell phones have become an anytime, anywhere tool used for texting, taking pictures, recording videos, making video calls, saving files such as a presentation, and many other things such as listening to music or playing games (Ling 22).
mobile phone viruses began to emerge, the first mobile phone virus was called Caribe, it was created to infect the Symbian mobile OS. By using the Bluetooth communication feature it was able to spread from phone to phone and upon activation of the device it would display the message "Caribe". In 2009 the first iPhone worm "Ikee" was created it was able to infect and spread among jailbroken iPhones that had installed SSH while using the default root password. This worm changes the wallpaper of your lock screen to a photo of Rick Astley with the message: "ikee is never going to give you up.” As of 2011, it 's reported that as much as 73,000 malware strains are written every day. Considering that mobile smart phones have slowly been replacing our PC’s daily to do task, we are more at risk now that these malwares are being increasingly written for mobile phones. Just look at history and what occurred with PCs: It may have started as a practical joke, but soon after users started putting more increasingly personal information it slowly turned from a joke into a more malicious purpose. History always repeats itself and it will be no different with smartphones and with this growing issue we need to be ready to increase our mobile security.