Preview

Smartphones

Good Essays
Open Document
Open Document
2330 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Smartphones
Cyber Threats to Mobile Phones
Paul Ruggiero and Jon Foote

Mobile Threats Are Increasing
Smartphones, or mobile phones with advanced capabilities like those of personal computers (PCs), are appearing in more people’s pockets, purses, and briefcases. Smartphones’ popularity and relatively lax security have made them attractive targets for attackers. According to a report published earlier this year, smartphones recently outsold PCs for the first time, and attackers have been exploiting this expanding market by using old techniques along with new ones. 1 One example is this year’s Valentine’s Day attack, in which attackers distributed a mobile picturesharing application that secretly sent premium-rate text messages from the user’s mobile phone. One study found that, from 2009 to 2010, the number of new vulnerabilities in mobile operating systems jumped 42 percent. 2 The number and sophistication of attacks on mobile phones is increasing, and countermeasures are slow to catch up. Smartphones and personal digital assistants (PDAs) give users mobile access to email, the internet, GPS navigation, and many other applications. However, smartphone security has not kept pace with traditional computer security. Technical security measures, such as firewalls, antivirus, and encryption, are uncommon on mobile phones, and mobile phone operating systems are not updated as frequently as those on personal computers. 3 Mobile social networking applications sometimes lack the detailed privacy controls of their PC counterparts. Unfortunately, many smartphone users do not recognize these security shortcomings. Many users fail to enable the security software that comes with their phones, and they believe that surfing the internet on their phones is as safe as or safer than surfing on their computers. 4 Meanwhile, mobile phones are becoming more and more valuable as targets for attack. People are using smartphones for an increasing number of activities and often store sensitive

You May Also Find These Documents Helpful

  • Good Essays

    In 1963 Martin Luther King gave the most powerful and famous speech in the history of the United States. 40 years later, no other speech has been able to overcome the effect that this speech has had on the American people generation after generation. Despite the fact that the message of the speech is perhaps the most enduring aspect of the speech, the rhetorical strategies Martin Luther King used were instrumental in captivating the attention of millions people then, and now. The purpose of “I have a dream” was to awaken awareness about the importance of equality and to transcend his vision through the use of pathos, ethos and biblical imagery, among other elements; these are the strategies that enabled him to compose a dialogue that is essentially as motivating as a work of poetry.…

    • 1053 Words
    • 5 Pages
    Good Essays
  • Good Essays

    In at least 500 words or less outline the physical journey undertaken by Susie and the language techniques employed by the composer to communicate this journey.…

    • 825 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Smart Phones

    • 296 Words
    • 2 Pages

    The fourth generation cellular speeds will most likely be 3 mbps to 5 mbps. This is still an improvement over 3g.…

    • 296 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cell Phones

    • 348 Words
    • 2 Pages

    In “Extra large, Please,” Alice M. Davies focuses on the increase of obesity with children, which schools are provoking. There are many various social problems in kids of America today ranging from poverty to drug abuse. One alarming factor that is rapidly exploding is childhood obesity. Alice Davies’ article, “‘Extra Large,’ Please,” which describe the alarming social problem of childhood obesity connected to the fast food industry in America today. Davies stated: “the number of American kids who are dangerously overweight has tripled. More than 16 percent of our children qualify as ‘obese’” (Davies). Although childhood obesity is a growing problem stemming from a terrible diet and lack of exercise, we can take action now to avoid further detriment towards their future health. The first cause of childhood obesity is the lack of inactivity. Many schools are not required to have any physical education. Unfortunately, Davies’ states: “Many of those schools are so short of money they’ve scrapped physical-fitness classes” and “too few communities have athletic programs in place.” It is terrible that schools have a hand in this growing epidemic. Also, Spurlock’s Supersize Me documentary shows that “schools are cutting out recess to study for testing and only one state requires physical-fitness classes.” It is terrible that most of these children taking exams are obese. In addition, they live in a dangerous neighborhood where they can’t go out and play because drug activity and violent crime may make playing outside dangerous. Communities should take part in making the neighborhood a safe haven for kids to play outside. The second cause of childhood obesity is poor eating habits. Children will rather eat candy instead of focusing on the products that are good for the body. Parents play a major role when it comes to allowing or giving their child food that will damage the body more less providing nutrients. Children need to leave the junk food behind…

    • 348 Words
    • 2 Pages
    Good Essays
  • Better Essays

    There are various security threats for the various mobile devices that we all use on a daily basis. Smartphones are outselling PCs and the lack of adequate security for these devices and other mobile devices leave them vulnerable targets for hackers and other cyber criminals. As the number of attacks increase, the strategies, mitigating solutions and other countermeasures are not keeping up to prevent these attacks. This case study will examine and explore mobile device security and other threats related to computer security.…

    • 1136 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Mobile devices are convenient and are quickly catching up with personal computers as the choice to access the Internet. Unfortunately this convenience comes with a cost. Security for mobile devices has not kept up with the market growth and consumer use. In this paper I will discuss; 1) emerging cyber security issues and vulnerabilities presented in the “Emerging Cyber Threats 2012” report, 2) vulnerabilities of mobile devices in regard to usability and scale, and methods to mitigate the vulnerabilities of mobile devices, 3) the value of cryptography and encryption in regard to Equifax’s approach to implementing stronger security policies around mobile devices, 4) discuss Gunter Ollmann’s comments about Zeus-in-the-Mobile (ZitMo) and describe the implications of advanced security breaches, 5) the greatest challenge in regard to controlling information online, and 6) Justify Dan Kuykendall’s statement about the biggest issue with mobile browsers and give two (2) examples illustrating his point.…

    • 2094 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    The Universal Declaration of Human Rights is the first global human rights treaty that was formulated. The main driving force behind the formation of the Universal Declaration of Human Rights was the Second World War, which in it course saw some of the worst human atrocities being committed on a global scale. The Declaration was adopted by the United Nations General Assembly on the 10th of December 1948.…

    • 1483 Words
    • 6 Pages
    Better Essays
  • Better Essays

    The term mobile devices are not limited to cellphones; they include iPads, iPods, Laptops, PDAs and e-Readers. These devices act as a lifeline to the outdoor world, and are frequently used for navigating, social networking, shopping, banking and business purposes. What is often forgotten about these devices is that they are gateways to hackers. “Mobile devices can be used by a hacker as an access point into many other aspects of your digital life as well the lives of others in your network, making mobile security about more than just protecting your phone,” (Certic, 2013). Mobile Technology became widely accepted by most of the world in the early 1980’s and since then, the evolution of technology has shown substantial growth. “Worldwide smartphone sales reached 144.4 million units in the first quarter, a 45% increase year over year, research firm Gartner reported. Tablet shipments jumped 120%, to 17.4 million units worldwide, according to a report from research company IDC,” (Drew, 2012). In 2013, over 80% of the world’s population uses a mobile phone and to date there are more than 6 billion mobile devices in the world. Concerns regarding cancer in relation to frequent use and security risks associated with the ability to protect the user’s information are controversial.…

    • 1441 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Cell Phones

    • 1164 Words
    • 5 Pages

    Cell phones have changed the way people socially interact with each other. Nowadays, anyone anywhere can just pick up their cell phone and call each other at any time of the day or night. (Stewart 1). In the past when there were just house phones around, people could use the excuse “Sorry I wasn’t home to answer your call” but now, with the emerging of cell phones, people will get a hold of you somehow. Cell phones are considered to be your own personal property while house phones are considered to be used for the family. Cell phones depend on satellite and signal, which means anyone, can take their cell phones anywhere they choose, while house phones depend on the wires in the house which limits anyone from using it outside of the house. (Stewart 1). For example, someone could be on their house phone and their little brother could be eavesdropping on the conversation. No one would want that, would they? On the other hand, cell phones are more personal and most of them have Wi-Fi which leads them to be connected to the internet. Now people are more socially involved on the web through Facebook, Twitter, Instant Messaging, etc. However, cell phones have both a positive and negative effect on people.…

    • 1164 Words
    • 5 Pages
    Good Essays
  • Good Essays

    “They have an app for that” is the mantra of most smartphone users, but an improperly configured smartphone can be an open invitation to hackers looking for easy information. Today’s modern smartphone can do anything from controlling your home computer to handling your online banking to watching TV to making video calls. With all the features included in them, they are very easy to stockpile important (and sometimes sensitive) information about the user. Since smartphones are essentially tiny computers, they suffer the same vulnerabilities of PC’s, including viruses, malicious applications, and hacking. If there is the tiniest flaw in the smartphone’s armor, hackers can gain access and take an enormous amount of data from it.…

    • 913 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Cell Phones

    • 1158 Words
    • 5 Pages

    Negative Effects of Cell Phones on Society's Social Lives | Negative Effects of Cell Phones on Society…

    • 1158 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Cell Phones

    • 881 Words
    • 4 Pages

    Why are cell phones dangerous? Cell phones are what people use in their everyday lives throughout the 21st century. Cell phones have been around since the 1980’s. Cell phones are being used from young kids to elderly adults. All around the world there are cell phones .…

    • 881 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Mobile Phones

    • 514 Words
    • 3 Pages

    Mobile phones are one of the most common information access devices with almost 31% of the global population having access. This exploratory study investigated usage patterns of, and attitude about, cell phones among university students in a mature market (United States) and a rapidly growing new market (India) by surveying students in each country. Key findings from the study include similarities in the usage of phones to communicate with others and in the perception of mobile phone usage in public settings, and differences in the use of text messaging and opinions regarding driving and mobile phone usage. Overall these results suggest students in India use mobile phones differently from their American counterparts. In a developing market like India, mobile phones may be the primary and only phone to which students have access.…

    • 514 Words
    • 3 Pages
    Good Essays
  • Good Essays

    smartphones in my opinion

    • 747 Words
    • 3 Pages

    Roman Polanski's (The director), "The Pianist" tells the story of a Polish Jew, a classical musician, who survived the Holocaust through stoicism and good luck. This is not a thriller, and avoids any temptation to crank up suspense or sentiment; it is the pianist's witness to what he saw and what happened to him.…

    • 747 Words
    • 3 Pages
    Good Essays
  • Good Essays

    While security breaches and malware are not as widespread on handheld devices such as smartphones and tablets, there still needs to be a “mobile threat prevention strategy” in place (James, 2009). With so…

    • 838 Words
    • 4 Pages
    Good Essays