All
All

Cyber Threats to Mobile Phones

176 KB | 3 files |  DOC, PDF

Smartphones’ popularity and relatively lax security have made them attractive targets for attackers.

Smartphones, or mobile phones with advanced capabilities like those of personal computers (PCs), are appearing in more people’s pockets, purses and briefcases. Smartphones’ popularity and relatively lax security have made them attractive targets for attackers. According to a report published early last year, smartphones recently outsold PCs for the first time, and attackers have been exploiting this expanding market by using old techniques along with new ones. One example is this last year’s Valentine’s Day attack, in which attackers distributed a mobile picture-sharing application that secretly sent premium-rate text messages from the user’s mobile phone. One study found that, from 2009 to 2010, the number of new vulnerabilities in mobile operating systems jumped 42 percent. The number and sophistication of attacks on mobile phones is increasing, and countermeasures are slow to catch up.

Included in this ZIP file are:

  • Intro Page.doc
  • Terms and Conditions.pdf
  • Cyber Threats to Mobile Phones.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

US-CERT is charged with providing response support and defense against cyber attacks for the Federal Civil Executive Branch (.gov) and information sharing and collaboration with state and local government, industry and international partners. US-CERT interacts with federal agencies, industry, the research community, state and local governments, and others to disseminate reasoned and actionable cyber security information to the public.

All IT Downloads from US-CERT» | Visit US-CERT »
Related IT Downloads

Mobile45 Vetting the Security of Mobile Applications

The purpose of this document is to help organizations understand the process for vetting the security of mobile applications, plan for the implementation of an app vetting process, develop app security requirements, and understand the types of app vulnerabilities and the testing methods used to detect those vulnerabilities. ...  More >>

mobile30 Guidelines on Mobile Device Forensics

This guide provides an in-depth look into mobile devices and explains technologies involved and their relationship to forensic procedures. ...  More >>

HealthCare01 Wi-Fi Enabled Healthcare

This excerpt from chapter 6 looks at the use of Wi-Fi-enabled mobile medical devices in health care settings. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date