Preview

Understanding the Vulnerabilities of a Smartphone

Good Essays
Open Document
Open Document
913 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Understanding the Vulnerabilities of a Smartphone
“They have an app for that” is the mantra of most smartphone users, but an improperly configured smartphone can be an open invitation to hackers looking for easy information. Today’s modern smartphone can do anything from controlling your home computer to handling your online banking to watching TV to making video calls. With all the features included in them, they are very easy to stockpile important (and sometimes sensitive) information about the user. Since smartphones are essentially tiny computers, they suffer the same vulnerabilities of PC’s, including viruses, malicious applications, and hacking. If there is the tiniest flaw in the smartphone’s armor, hackers can gain access and take an enormous amount of data from it. With the rise in popularity of Wi-Fi and Bluetooth technology embedded into smartphones, it has gained the attention of hackers out to gather information as another way to get into a system. Bluetooth technology is a very small area networking device, meaning that it can communicate wirelessly to other Bluetooth devices in the vicinity of 25-30 feet. But that also means that any hacker with that same technology can gain entry into a smartphone and wreak havoc that way. Any information stored on that phone is now available to them to take and do with as they please. The only disadvantage to a hacker using Bluetooth is that they have to be within range, so they typically target large crowds of people if they are going to use that transmission medium to gather information.
Embedding Wi-Fi into smartphones is another way for hackers to gain access to information easily. If a smartphone has Wi-Fi enabled, it means that it can connect to a number of access points or “hotspots” to access the internet, just like a PC would. Alternatively, this also means that it opens it up so that a hacker looking for information can access that smartphone though a computer with more ease than going through Bluetooth. Once a hacker has linked up to a smartphone

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In this article, the authors not only cite the article by A. Fishman and M. Marquis-Boire but also used their own thoughts to make their story effectively “Cyanogen Mod is an open-source firmware distribution based on Android that lets users install apps without granting all requested permissions.” and “Blackphone has an OS that is based on a fork of Android. / Despite the Blackphone’s focus on security, a data-type confusion vulnerability in its code was disclosed and fixed in January 2015. The vulnerability could have allowed remote attackers to execute arbitrary code on Blackphones.” (3), these stories will cause attention to the readers…

    • 143 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Better Essays

    Technologic advances occur at a rapid pace, with new devices coming out at frequent intervals. These new devices are appealing to college students who want to do everything as quickly and easily as possible. Because of the numerous smartphones, tablets, and laptops used by students and employees, college campuses face various security issues from mobile devices that connect to the network, often unintentionally.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Students, especially college students, are consistently on some type of social media site or on a mobile device that gains them that type of access. There are many varieties of devices such as tablets, smartphones, laptops, and now even smartwatches. Devices such as these are connecting to wireless networks whether it’s from a service provider or campus. With these connections many aren’t just using them for social media, but also for checking grades, schedules, or relevant news. The devices depend on connecting to networks but also need to do so in a secure fashion. Each device has to be checked for viruses, spyware, and other types of malware while still maintaining the C-I-A triad. A balance must be found between usability and security. Each time a remote device is connected to the network there is a possibility that the network can be compromised by one these devices. Every device should be authenticated, scanned, and identified. Many are unaware of the risks that can come from connecting to networks, especially wireless access.…

    • 650 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The growth of social networks and smartphones over the past few years has come with a dangerous side-effect: the violation of privacy and security. Social networks such as Facebook and Twitter may appear to be a fun way to keep in touch or to easily socialize with friends and family, but as these networks continue to grow some very serious privacy and security concerns emerge. Interestingly these concerns could be easily prevented by any educated user. The problem occurs when social network and smartphone companies force the average user to have to work towards gaining this education by hiding or not fully explaining some of their settings and features. One of the biggest cases of this is the recent emergence of coordinate-based apps on smartphones. In many of these apps, location services – a setting that allows the app to record the user’s exact coordinates at a given time – is turned on by default; the average user may never even be aware of its existence. This is not the only example of technology designed to follow people, there are many more new features being developed all the time to track and record an individual’s movements, despite their fun and harmless appearance; user education has become necessary for security.…

    • 1470 Words
    • 6 Pages
    Good Essays
  • Best Essays

    cow papper english

    • 1388 Words
    • 6 Pages

    National Science Foundation. (2010). Can Clever Hackers Target Smart Phones? Retrieved August 27, 2010, from http://www.nsf.gov/news/news_summ.jsp?cntn_id=116723…

    • 1388 Words
    • 6 Pages
    Best Essays
  • Better Essays

    In today society almost everyone has some form of computer or phone with internet capacity that are exposed to hackers and those that wish to interrupt the cyber world. It is imperative that we all become better educated to the risks and pitfalls that go along with accessing cyber space from any kind of device with access to the world-wide web. Be it by cell device, laptop, notebook, or home computer. I would like to take this time to inform others of the current trends being used to secure not only our devices but our privacy and what the future holds for the growing security and privacy problems in the cyber world.…

    • 1684 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Social Security

    • 707 Words
    • 3 Pages

    The author stated in source 2 "Downloading and installing an application (or app, for short) could endanger your data privacy, too, if the app collects information from your cell phone without your permission. Some apps explicitly ask for permission to access your cell phone in different ways." This also means that some apps are not safe because they take in your personal information from your phone and your privacy is in danger. Hackers all over the internet waiting for something like this to happen because they see it as a opportunity When using the internet use the right websites so your personal information is…

    • 707 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Iphone Security Issues

    • 469 Words
    • 2 Pages

    Information breaks, hacking and device thievery is a standard piece of cutting edge life. So as to protect clients, Apple and Google added extremely viable security components to their phone working frameworks making them effectively unlockable. However, the FBI wants Apple to diminish advancements it has made on encryption programming, contending this is making it less demanding for fear based oppressors and different unsafe people to dodge identification.…

    • 469 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Dive-by downloads, malicious code-worms and Trojans, both are considered top emerging threats to mobile computing in the European continent. Code injections this form of attach in currently on the rise due to proliferation of automated attack tools. This type of attack is mostly directed to management systems and targeted by cyber criminals. Moreover large scale automated attacks have become increasingly used to attack cloud computing service networks. Exploit kits according to the ENISA these kits are considered to be the biggest arsenal tool for cyber criminals to infiltrate network systems and commit cybercrimes. Botnets are threats that many companies have to fight and protect them self from these particular threat controls computers often without users being aware that their systems have been compromised. For Europe the threat is constantly evolving, which is why it is critical for companies to implement multilayer security that goes beyond tools and technology to prevent cyber criminals from infiltrating secured information.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Bluetooth Introduction History Technology Overview The BlueSnarf Attack The HeloMoto Attack The BlueBug Attack Bluetooone Long-Distance Attacking…

    • 1911 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    In the field of computing, few inventions, innovations or technological improvements, have been moving quite like wireless technology. With the advent of fourth generation cell phones and networks (4G), there have literally been leaps and bounds made in the realm of personal computing, productivity and data sharing. It is this increased connectivity both in our personal and business lives that introduce risks to intrusion, corruption or theft of data, or in the worst case, access to personal data that would lead to identity theft. In the business realm, this translates to problems for firm infrastructure and exposure to proprietary leaks, loss of customer data, or damage to the reputation of the business entity. Therefore, it is important that adequate measures are taken to evaluate risks and take steps both personally and professionally to minimize those risks. We present several advantages and disadvantages of the Android OS platform with very high visibility right now in the wireless arena. Both for the flexibility and open architecture, this platform presents some unique challenges in terms of security.…

    • 2941 Words
    • 12 Pages
    Good Essays
  • Better Essays

    So the security of the Bluetooth becomes very important. We have different types of security for Bluetooth to protect the data over the transmission…

    • 2593 Words
    • 11 Pages
    Better Essays
  • Good Essays

    In today's world mass shootings are becoming a regular thing. It is the sad truth. But, if Apple could lower it's ego and disturbed policies the FBI could find more information on terrorist attacks. There is a very real possibility that these men were part of a terrorist group or organization. Yet it is impossible to know whether or not they truly were a part of a bigger picture without accessing their phone. It is crucial that Apple develops the software to access the shooter's cellphone as it may hold information that can help protect the people of the United…

    • 797 Words
    • 4 Pages
    Good Essays