All
All

Cyber Threats to Mobile Phones

176 KB | 3 files |  DOC, PDF

Smartphones’ popularity and relatively lax security have made them attractive targets for attackers.

Smartphones, or mobile phones with advanced capabilities like those of personal computers (PCs), are appearing in more people’s pockets, purses and briefcases. Smartphones’ popularity and relatively lax security have made them attractive targets for attackers. According to a report published early last year, smartphones recently outsold PCs for the first time, and attackers have been exploiting this expanding market by using old techniques along with new ones. One example is this last year’s Valentine’s Day attack, in which attackers distributed a mobile picture-sharing application that secretly sent premium-rate text messages from the user’s mobile phone. One study found that, from 2009 to 2010, the number of new vulnerabilities in mobile operating systems jumped 42 percent. The number and sophistication of attacks on mobile phones is increasing, and countermeasures are slow to catch up.

Included in this ZIP file are:

  • Intro Page.doc
  • Terms and Conditions.pdf
  • Cyber Threats to Mobile Phones.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

US-CERT is charged with providing response support and defense against cyber attacks for the Federal Civil Executive Branch (.gov) and information sharing and collaboration with state and local government, industry and international partners. US-CERT interacts with federal agencies, industry, the research community, state and local governments, and others to disseminate reasoned and actionable cyber security information to the public.

All IT Downloads from US-CERT» | Visit US-CERT »

Related IT Downloads

PhoneGap Build: Developing Cross Platform Mobile Applications in the Cloud

This excerpt from chapter four focuses on using PhoneGap Build, including beginning steps, creating builds for different mobile platforms, loading private keys, and installing builds on the emulator. ...  More >>

Guidelines Managing the Security of Mobile Devices in the Enterprise

This publication provides recommendations for selecting, implementing, and using centralized management technologies, and it explains the security concerns inherent in mobile device use and provides recommendations for securing mobile devices throughout their life cycles. ...  More >>

Tutorial Building Security into ‘Off-The-Shelf’ Smartphones

This paper from the National Institute of Standards and Technology discusses the key issues surrounding smartphone security. It’s a great starting point if you’re trying to emphasize the importance of proper security in the age of BYOD. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data