Mobile Device Attacks

1627 Words4 Pages

Mobile Device Attacks
Mobile devices are more prevalent today than ever. In fact, escalation of the pure power and speed of mobile processors, advancements in mobile operating systems, and the overwhelming attractiveness of mobile broadband make cell phones and tablets the best candidate for mobile computing devices (Wong, 2010). With this increased use, though, both by the general populace and by businesses, the need for security and awareness of the risks inherent in their use is paramount. Unfortunately, the very thing that makes mobile devices so valuable also makes them more vulnerable to attack. According to the United States Computer Emergency Readiness Team (2011), from 2009 to 2010, “the number of new vulnerabilities in mobile operating systems [increased] 42 percent” (Ruggiero & Foote). In addition, the sophistication of the attacks is increasing while new countermeasures are harder to come by. By being aware of the risk involved and taking the appropriate measures however, consumers can rely on their mobile devices to give the convenience sought while still keeping vital information secure from prying eyes.
Cyber Threats to Mobile Phones
Today, people are using smartphones, tablets and other mobile devices for a growing number of activities, including banking and bill payments, and relying on them increasingly for storage of valuable personal information, such as contact information, emails and even passwords. Social applications abound, and many store personal information and stay logged on, opening avenues of attack for hackers.
Perhaps the most valuable asset of a mobile device is its largest weakness: ease of theft. Most security features on mobile devices are rudimentary and a determined hacker with enough time ...

... middle of paper ...

...ved from: http://www.bankinfosecurity.com/top-threats-to-mobile-devices-a-5928?rf=2013-07-23-eb&elq=8c204741e97e4394b751e6a762e2cce6&elqCampaignId=7326
Ruggiero, P. & Foote, J. (2011.) “Cyber threats to mobile phones.” Retrieved from: https://www.us-cert.gov/sites/default/files/publications/cyber_threats-to_mobile_phones.pdf
Sawyer, J. H. (April 10, 2013.) “Trends in mobile device threats.” Retrieved from: http://www.darkreading.com/mobile/trends-in-mobile-device-threats/240152580
Verkooij, K., & Spruit, M. (2013). Mobile business intelligence: Key considerations for implementations projects. The Journal of Computer Information Systems, 54(1), 23-33. Retrieved from http://search.proquest.com/docview/1471047566?accountid=8289
Wong, K. Y. (2010). Cell phones as mobile computing devices. IT Professional Magazine, 12(3), 40-45. doi:http://dx.doi.org/10.1109/MITP.2010.46

Open Document