Mobile Device Attacks
Mobile devices are more prevalent today than ever. In fact, escalation of the pure power and speed of mobile processors, advancements in mobile operating systems, and the overwhelming attractiveness of mobile broadband make cell phones and tablets the best candidate for mobile computing devices (Wong, 2010). With this increased use, though, both by the general populace and by businesses, the need for security and awareness of the risks inherent in their use is paramount. Unfortunately, the very thing that makes mobile devices so valuable also makes them more vulnerable to attack. According to the United States Computer Emergency Readiness Team (2011), from 2009 to 2010, “the number of new vulnerabilities in mobile operating systems [increased] 42 percent” (Ruggiero & Foote). In addition, the sophistication of the attacks is increasing while new countermeasures are harder to come by. By being aware of the risk involved and taking the appropriate measures however, consumers can rely on their mobile devices to give the convenience sought while still keeping vital information secure from prying eyes.
Cyber Threats to Mobile Phones
Today, people are using smartphones, tablets and other mobile devices for a growing number of activities, including banking and bill payments, and relying on them increasingly for storage of valuable personal information, such as contact information, emails and even passwords. Social applications abound, and many store personal information and stay logged on, opening avenues of attack for hackers.
Perhaps the most valuable asset of a mobile device is its largest weakness: ease of theft. Most security features on mobile devices are rudimentary and a determined hacker with enough time ...
... middle of paper ...
...ved from: http://www.bankinfosecurity.com/top-threats-to-mobile-devices-a-5928?rf=2013-07-23-eb&elq=8c204741e97e4394b751e6a762e2cce6&elqCampaignId=7326
Ruggiero, P. & Foote, J. (2011.) “Cyber threats to mobile phones.” Retrieved from: https://www.us-cert.gov/sites/default/files/publications/cyber_threats-to_mobile_phones.pdf
Sawyer, J. H. (April 10, 2013.) “Trends in mobile device threats.” Retrieved from: http://www.darkreading.com/mobile/trends-in-mobile-device-threats/240152580
Verkooij, K., & Spruit, M. (2013). Mobile business intelligence: Key considerations for implementations projects. The Journal of Computer Information Systems, 54(1), 23-33. Retrieved from http://search.proquest.com/docview/1471047566?accountid=8289
Wong, K. Y. (2010). Cell phones as mobile computing devices. IT Professional Magazine, 12(3), 40-45. doi:http://dx.doi.org/10.1109/MITP.2010.46
Works Cited for: Caplan, Hayley. How to Avoid Cell Phone Identity Theft? What Is Privacy? N.p., 31 July 2012. Web.
In this micro-study, I will use tools and information available to the public via internet in attempt to hack the iPhone. Currently the iPhone is only sold to subscribers of the AT&T telecommunication service provider and all applications and updates are installed using Apple’s iTunes software. Using various resources I will focus the two main issues which have put Apple and the iPhone user community into the limelight. First, the “unlocking” of the iPhone, which bypasses the iTunes activations process and allows the device to be used on any SIM (Subscriber Information Module) card cellular phone service provider other than AT&T, in this micro-study I will be using a T-Mobile SIM card. Second, I will attempt to “jailbreak” the device, which will allow me to install third-party applications through underground sources and not directly from Apple. As I attempt to hack the iPhone, I will compare drawbacks and benefits of hacking methods, ease of use, and verify Apple’s claims on affecting functionality and possible damag...
[39] Kevin Johnson and Tony DeLaGrange. SANS Institute. SANS Survey on Mobility/BYOD Security Policies and Practices 2012 [Online] Available from: http://www.sans.org/reading-room/analysts-program/SANS-survey-mobility [Accessed 07 Dec 2013]
As we progress deeper into the digital era, we rely more and more on our electronic devices. Over the last decade, almost everyone who lives in a developed nation owns a cellphone and they are becoming an integral part of our life.
In this case study, I aim to present the recent issue about Cyber security, protecting client’s private data and information through the controversial Apple and
recent years. Number of smartphone users passed 1 billion in 2012 and is predicted to increase by next billion within less than three years. This increasing trend of using mobile device h...
Many people in today’s society rely on technology to help us with our daily lives and help us stay connected to family, friends, and other people. The advancements in today’s cell phone technology is very complex and made to be efficient for their owners, allowing them to surf the net and IM message people instantly. Cellphones in particular have developed very fast in the past 15 years. From my childhood, cell phones have evolved from the old school Nokia bricks that allowed texts, calls, and simple graphic games, to todays I-Phones that have higher computable capabilities than some computers. In the United States alone, there is an estimated population of around 297 million people, and 197 million people are subscribed to cell phone companies (Starr). With so many people in today’s society with so much power and opportunity in the palm of their hands, we shouldn’t forget that “With great power comes great responsibility” –Voltaire.
While the conventional desktop PC will still continue to serve important functions at both consumer and professional levels, there is an expectation that mobile devices will become the predominant form for accessing both personal and professional content; it is understandable that cyber criminals have begun focusing on mobile devices which have at the same time grown their user base while substantially consolidating the operating system variants which makes the surface area for a potential attack substantially larger (Juniper Networks, n.d.).... ... middle of paper ... ... Mobile Device Security: A Survey of Mobile Device Threats, Vulnerabilities and their Defensive Mechanism. International Journal of Computer Applications.
I will be searching about the Security Risks of Mobile Phones, Expanding on them, how they affect us and what we can do to prevent them. “About 75 percent of the world has Mobile Phones”. I will be searching how it affects their everyday life. I will also talk about different Mobile Phones and what kind of risks they contain. It is a Vast and broad topic which requires a lot of Research. I will be searching different sites to make sure that I have
Dina EL Menshawy, Hoda M. O. Mokhtar, Osman Hegazy, 2012, “Enhanced Authentication Mechanisms for Desktop Platform and Smart Phones”, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 3, No.10, 58 - 92.
When phones became available to the public they were not considered to be mobile in today’s sense of the word. They were available to have installed in an automobile, they were big and bulky, and they needed and consumed a lot of power to use. The phone networks would only support a few simultaneous conversations. Cell phones since then have made vast improvements in their efficiency, abilities, and size. The first handheld mobile phone wasn’t produce until 1973. The origin...
This paper is going to discuss wireless security from a broad view where I will go into why wireless security is so important, especially today as the ways in which we communicate is changing dramatically. From there I will discuss the multiple wireless security options that are available to give a better understanding of the options given. Then I will go into why exactly not protecting your wireless can be so dangerous with some descriptions on the most dangerous wireless attacks out there today. Finally, I will then discuss how we can better prepare for these types of attacks with a synopsis on several effective security methods that will help to ensure data is securely passed and kept hidden. Wireless is everywhere today whether at home working from your WIFI network to work where you might be linked to a wireless network or even through your phone through a 3G or 4G network to connect to an open wireless network.
The world today is a result of centuries of evolution; one of the major adaptations is technology, specifically the invention of the smartphone. The smartphone is a cellular phone that has the capabilities of performing similar functions to that of a computer (Oxford Dictionaries’ online dictionary, n.d.). The smartphone is owned by youth for the most part; however, adults and seniors are also turning toward using this device. This in turn demonstrates the popularity of this marvelous device, and is the reason why it is constantly monitored by its users. The continuous evolving of the populations' wants and needs such as communication, searching of information, entertainment and recording, makes owning a smartphone essential, and beneficial as it is portable, reliable and efficient.
Devices such as smartphones have become essential - over 1 billion smart phones were sold worldwide last year (Zeman, 2014). However, our reliance on technology has its pitfalls, and we are also more vulnerable, often in ways we do not know or understand. If we are to maintain our security we need to find ways to do this that fit in with our lifestyles. We can change behaviours, by education and training, but ideally we should design in security from the ground up, rather than adding it on, or trying to force actions that people simply won’t follow because they find them irritating or think they’re simply not important. Security should be something that just happens.
...h the threat of “Mobile Malware” looming in the air, the desire to give the general public fair warning has never been greater. This paper was intended to provided that knowledge the general public needs and will reinforce the topic to those who were already aware. The history of malware gave you a look into the not so distant past. The discussion of technical examples of malware was intended to show you how rapidly the threat is developing along with the statistics of malware’s current expansion, and the future examples of malware and research showed you concepts that were unimaginable to the common electronic consumer. The majority of malware was originally designed to be a practical joke, but as we can see from the ever growing desire for malicious intent, the evolution of malware has followed suite. We can only hope that the growing need for security can be met.