Security issues for downloaded code in mobile phones

2002 ◽  
Vol 14 (5) ◽  
pp. 219-227 ◽  
Author(s):  
D. Babb ◽  
T.E. Dodgson ◽  
C. Bishop
Author(s):  
Thangavel M. ◽  
Divyaprabha M. ◽  
Abinaya C.

Smart devices like mobile phones, tablets, and laptops have become necessities in our lives due to the services they provide. However, in recent days, mobile applications have become a major threat for an attack. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. However, it also means hackers can easily distribute malware to smartphones, launching various attacks. Each day, a mobile device attack is changing dynamically, and it is very difficult to represent a complete set of threats and vulnerabilities. Mobile phone security has become an important aspect of security issues in wireless multimedia communications. The development of mobile applications has increased drastically; hence, it is our responsibility to protect our devices and the data within them. Being aware is the first step to protect data. Thus, to prevent the mobile from the threats, efforts are required to form the application developer, app market administrator, and user to defend against the malware. This article explores those threats and vulnerabilities of mobile applications.


Author(s):  
River Yan

The research literature on awareness, knowledge, and ability of mobile security of young mobile phone users was reviewed in this article. The existing literature suggests that young mobile phone users are usually not aware of potential mobile security issues when using a mobile phone. Young mobile phone users are often found to lack the knowledge to detect mobile security problems and to defend themselves in the mobile world. Empirical evidence also exists in which some users do not have the mobile security ability to safely use their mobile phones. Overall, it is vital that young users improve their awareness, knowledge, and ability of mobile security so that they can effectively and enjoyably use their mobile phones.


SAGE Open ◽  
2020 ◽  
Vol 10 (3) ◽  
pp. 215824402093953 ◽  
Author(s):  
Syed Far Abid Hossain ◽  
Zhao Xi ◽  
Mohammad Nurunnabi ◽  
Khalid Hussain

The article analyzes the role of driving m-commerce with social networking and therefore provides insight into how the application of mobile apps influences customers’ perceptions on purchasing products online and on the mode of payment. The consumers are engaged in social interactions through the internet by the new opportunities provided by social media. These interactions provide and generate certain values for both businesses and consumers. An upsurge in the application of social media on mobile phones by users is evident, giving optimism and the ability to view the role of the integration of m-commerce into social media. Certain criteria like mobile app compatibility, trust, perceived value of mobile phone apps for online shopping, and online payment are examined from the point of view of consumers who purchase products, save purchase time, and provide easy use and security through social networking sites and m-commerce. Adoption of a digital mode of payment is affected by the education level of the consumers as, if they are internet savvy, they will be more inclined to use the digital payment mode. The article not only discusses the role of education in the better understanding of consumers toward the application of online modes of transaction through mobile phones, but also indicates that there are security issues, although these have been resolved to some extent by technological advances. Yet, there is need for the retailers as well as the consumers to achieve further technological progress.


10.28945/3301 ◽  
2009 ◽  
Author(s):  
Emmanuel Adagunodo ◽  
Oludele Awodele ◽  
Sunday Idowu

In this paper, we present a way to bring information to students by leveraging the availability of phones (with SMS capability), especially cell phones. We review the use of mobile phones for delivering examination results via Short Messaging Service (SMS) in a university, where student who have written examinations and anxious to see their results need to get their grades in a convenient and accessible way, whether in the comfort of their homes, on the road or while at work. Mobile phone seems to be an asset most individuals’ posses, and take almost everywhere with them, it is therefore a highly effective means of bringing information to them faster, easily and on the move. An SMS result checking system not only enables students to request for their grades, the system can also deliver the grades to their phones as soon as the grades become available. This means that they can access their grades even in the remotest locations where internet facility might be unavailable, preventing them from accessing the school’s website. This study shows the implementation of such system and considers the security issues associated. The system enforces security with the use of secret information (password), and also provides access to new and old grades.


Author(s):  
Mamata Rath

There are higher rates of mobile devices in current networks that are associated with each other intelligently using internet of things (IoT) domain to make diverse communication in various applications. Therefore, security issues are a major concern to accomplish a protected communication. There are many functions and cryptographic algorithms developed during research which can be utilized as a part of the communication trade among the devices to make secure internet of things networks in an approach to ensure right transmission. Big data is the most demanding concept used in business analytics and massive data processing. It is heard all over the place, particularly in the social insurance industry. Traditionally, the tremendous measure of data produced by the medicinal services industry was put away as printed version. This data has the ability to help an extensive variety of medicinal services and restorative capacities. The digitization of such data is called big data. The chapter features critical security issues in IoT-associated devices both in wireless network and big data analytics along with all other widely used area where IoT environment has been implemented. It also describes security issues in IoT systems particularly when IoT computing devices are used in critical real-time applications such as utilizing IoT frameworks involving information transmission with mobile phones, existing secured systems for enormous information, and individual information security including verification and secured correspondence in IoT.


Author(s):  
River Yan

The research literature on awareness, knowledge, and ability of mobile security of young mobile phone users was reviewed in this article. The existing literature suggests that young mobile phone users are usually not aware of potential mobile security issues when using a mobile phone. Young mobile phone users are often found to lack the knowledge to detect mobile security problems and to defend themselves in the mobile world. Empirical evidence also exists in which some users do not have the mobile security ability to safely use their mobile phones. Overall, it is vital that young users improve their awareness, knowledge, and ability of mobile security so that they can effectively and enjoyably use their mobile phones.


2011 ◽  
pp. 305-324
Author(s):  
D. Babb ◽  
C. Bishop ◽  
T. Dodgson ◽  
V. Sdralia

Author(s):  
Thangavel M. ◽  
Divyaprabha M. ◽  
Abinaya C.

Smart devices like mobile phones, tablets, and laptops have become necessities in our lives due to the services they provide. However, in recent days, mobile applications have become a major threat for an attack. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. However, it also means hackers can easily distribute malware to smartphones, launching various attacks. Each day, a mobile device attack is changing dynamically, and it is very difficult to represent a complete set of threats and vulnerabilities. Mobile phone security has become an important aspect of security issues in wireless multimedia communications. The development of mobile applications has increased drastically; hence, it is our responsibility to protect our devices and the data within them. Being aware is the first step to protect data. Thus, to prevent the mobile from the threats, efforts are required to form the application developer, app market administrator, and user to defend against the malware. This article explores those threats and vulnerabilities of mobile applications.


Author(s):  
Abhishek Kumar ◽  
Jyotir Moy Chatterjee ◽  
Pramod Singh Rathore

In today's society, there is a high volume of smartphones, with Android being the most popular and most commonly used smartphones. In the last few years, the Android market has been booming, making lots of developers join the industry so as to create various mobile applications that are a benefit to people's lives. However, its over-popularity has brought many crime issues, including security. One of the major common incidents to mobile users is having their mobile phones lost or stolen. Since most mobile users want to find their lost phones, they are looking for the most reliable features that can help them locate their smartphones. Luckily, there are some developed applications and services that have been designed to track down and locate lost or stolen smartphones. In this work, the authors tried to identify a collection of these applications and the information they send to the user in aiding them to find their phone. Since some applications are able to send location information or a photo, this work will look at what metadata is usually sent with the message.


2020 ◽  
Vol 9 (2) ◽  
pp. 1-18
Author(s):  
Abhishek Kumar ◽  
Jyotir Moy Chatterjee ◽  
Pramod Singh Rathore

In today's society, there is a high volume of smartphones, with Android being the most popular and most commonly used smartphones. In the last few years, the Android market has been booming, making lots of developers join the industry so as to create various mobile applications that are a benefit to people's lives. However, its over-popularity has brought many crime issues, including security. One of the major common incidents to mobile users is having their mobile phones lost or stolen. Since most mobile users want to find their lost phones, they are looking for the most reliable features that can help them locate their smartphones. Luckily, there are some developed applications and services that have been designed to track down and locate lost or stolen smartphones. In this work, the authors tried to identify a collection of these applications and the information they send to the user in aiding them to find their phone. Since some applications are able to send location information or a photo, this work will look at what metadata is usually sent with the message.


Sign in / Sign up

Export Citation Format

Share Document