scholarly journals Analysis of Mobile Malware: A Systematic Review of Evolution and Infection Strategies

2021 ◽  
Vol 4 (2) ◽  
pp. 1-29
Author(s):  
Moses Ashawa ◽  
Sarah Morris

The open-source and popularity of Android attracts hackers and has multiplied security concerns targeting devices. As such, malware attacks on Android are one of the security challenges facing society. This paper presents an analysis of mobile malware evolution between 2000-2020. The paper presents mobile malware types and in-depth infection strategies malware deploys to infect mobile devices. Accordingly, factors that restricted the fast spread of early malware and those that enhance the fast propagation of recent malware are identified. Moreover, the paper discusses and classifies mobile malware based on privilege escalation and attack goals. Based on the reviewed survey papers, our research presents recommendations in the form of measures to cope with emerging security threats posed by malware and thus decrease threats and malware infection rates. Finally, we identify the need for a critical analysis of mobile malware frameworks to identify their weaknesses and strengths to develop a more robust, accurate, and scalable tool from an Android detection standpoint. The survey results facilitate the understanding of mobile malware evolution and the infection trend. They also help mobile malware analysts to understand the current evasion techniques mobile malware deploys

2020 ◽  
Vol 26 (3) ◽  
pp. 131-135
Author(s):  
Teodor Mitrea ◽  
Monica Borda

AbstractThe spectacular growth in the use of mobile devices is a natural consequence of the benefits they offer. However, most mobile users grant little importance to the security of information stored, processed and transmitted. Even more, the last two years can be considered years of reference for the mobile security industry - ranging from virulent mobile ransomware attacks to mobile IoT botnets and mobile security breaches through mobile malware, that have redefined security paradigms. It is clear that we are at a point of inflection and transition to another generation of cyber attacks and the tendency is that attacks on mobile devices will expand. The security of mobile devices is a topical issue and the main objective is to educate the user to know the risks to which he/she is exposed to and to offer him/her viable security solutions in order to protect himself/herself against mobile threats. In this article we are going to present some protection and mitigation strategies with recommendations for improvement.


2020 ◽  
Vol 5 (1) ◽  
pp. 40-47
Author(s):  
Ning Sa ◽  
Xiaojun (Jenny) Yuan

AbstractWith the development of mobile technologies, voice search is becoming increasingly important in our daily lives. By investigating the general usage of voice search and user perception about voice search systems, this research aims to understand users’ voice search behavior. We are particularly interested in how users perform voice search, their topics of interest, and their preference toward voice search. We elicit users’ opinions by asking them to fill out an online survey. Results indicated that participants liked voice search because it was convenient. However, voice search was used much less frequently than keyboard search. The success rate of voice search was low, and the participants usually gave up voice search or switched to keyboard search. They tended to perform voice search when they were driving or walking. Moreover, the participants mainly used voice search for simple tasks on mobile devices. The main reasons why participants disliked voice search are attributed to the system mistakes and the fact that they were unable to modify the queries.


2021 ◽  
pp. 175857322110102
Author(s):  
Michael D Eckhoff ◽  
Josh C Tadlock ◽  
Tyler C Nicholson ◽  
Matthew E Wells ◽  
EStephan J Garcia ◽  
...  

Introduction Lateral condyle fractures are the second most common pediatric elbow fracture. There exist multiple options for internal fixation including buried K-wires, unburied K-wires, and screw fixation. Our study aims to review the current literature and determine if fixation strategy affects outcomes to include fracture union, postoperative range of motion, and need subsequent surgery. Methods A systematic review of Pubmed, MEDLINE, and EMBASE databases was performed. Included articles involve pediatric patients with displaced lateral condyle fractures treated with internal fixation that reported outcomes to include union rates and complications. Results Thirteen studies met inclusion criteria for a total of 1299 patients (472 buried K-wires, 717 unburied K-wires, and 110 screws). The patients’ average age was 5.8 ± 0.6 years, male (64%), and had 16.3 months of follow-up. No differences in union and infection rates were found. Unburied K-wires had the shortest time to union and the greatest elbow range of motion postoperatively. Conclusions Our systematic review demonstrates similar outcomes with union and infection rates between all fixation techniques. Unburied K-wires demonstrated a shorter time to union and the greatest postoperative range of motion. Additionally, unburied K-wires may be removed in clinic, decreasing the cost on the healthcare system. Evidence Level 3.


2020 ◽  
Vol 79 (Suppl 1) ◽  
pp. 1739.2-1739
Author(s):  
C. Hatzantonis

Background:Knee osteoarthritis has been a leading cause of chronic pain and disability in our increasingly aging population. Conservative management options of physiotherapy and oral analgesics offer some relief, but delivery of intra-articular injections such as corticosteroids or hyaluronic acid has increasingly become the mainstay of pain management of knee osteoarthritis. In a clinical setting, intra-articular injections offer a means to delay a total knee replacement. Despite the abundance of literature on corticosteroids and hyaluronic acid, there is no known percentage of infection rates or adverse effects that clinicians may use to inform patients prior to obtaining consent for the injection.Objectives:To determine a rate of adverse events and infection rates in patients undergoing intra-articular injections of corticosteroids or hyaluronic acid.Methods:A systematic review of current literature including studies involving patients ranging from 45 patients (Carmona L, 2018) to Cochrane reviews of 1767 patients (Campbell Kirk, 2015). From these studies, the number of patients, adverse reactions (i.e. pain, erythema) and serious adverse reactions (infections) were calculated.Results:Within our study, there was a large variation of numbers of adverse effects of hyaluronic acid and corticosteroids amongst studies, with percentages as variable as 0-9.3%. Corticosteroids demonstrated 11-26% reduction of adverse events compared to hyaluronic acid. However, confidence intervals were found to not be statistically significant.Conclusion:Intra-articular injections of corticosteroids and hyaluronic acid, although deemed clinically effective, continue to demonstrate variable rates of adverse effects and infection amongst patients with progressive knee osteoarthritis.Disclosure of Interests:None declared


Unity Journal ◽  
2021 ◽  
Vol 2 ◽  
pp. 251-262
Author(s):  
Sumitra Karki

Nepal has been a home to diversified settlement in terms of ethnicity, religion, dialect and culture since its outset in civilization. It also lies between two great military and economic giants of Asia – India and China – that are hostile to each other. While these bring abundant opportunities for Nepal, it possesses several internal and external security threats. Nepal suffers from cyber-attack, environmental degradation, pandemic, ethnic, racial or religious conflicts, inequality and poverty, extremism, human trafficking, corruption, migration and trans-boundary crime. In addition, Nepal also faces several security threats, traditional and non–traditional, including terrorism and insurgency. These threats possess serious implications on peace and security of Nepal and the South Asian region. There is a need of serious study about the major internal and external security challenges that Nepal faces in recent decades. This study aims at examining some of the major security challenges, explore the factors behind it, and attempt to suggest few policy recommendations to the government of Nepal to deal with them. The study is conducted by reviewing the primary and secondary sources of data. The primary data includes documents of the government agencies, press release, joint statement and organizational reports. It also includes the interviews with security experts, bureaucrats, policy makers and academicians. Similarly, secondary data includes books, news reports, academic journals, seminars report and reports of research institutes and think tanks. The study highlights that Nepal should prepare itself to meet with the emerging internal and external security challenges what have emerged in recent times. With the rise of India and China, two adversarial powers in the region, Nepal possess extreme challenges in days to come. Similarly, hardly any countries of the world had prepared itself to deal with recent pandemic like COVID-19 that has shattered even the most powerful countries of the world. Taking lessons from these, it is time for Nepal to learn and prepare to mitigate the challenges.


Author(s):  
S Bello ◽  
EA Bamgboye ◽  
DT Ajayi ◽  
EN Ossai ◽  
EC Aniwada ◽  
...  

Background: Compliance with handwashing in busy healthcare facilities, such as intensive care units (ICUs), is suboptimal and alcohol hand-rub preparations have been suggested to improve compliance. There is no evidence on the comparative effectiveness between handwash and hand-rub strategies. This systematic review was to assess the effectiveness of handwash versus hand-rub strategies for preventing nosocomial infection in ICUs. Methods Studies conducted in ICUs and indexed in PubMed comparing the clinical effectiveness and adverse events between handwash and hand-rub groups were included in a systematic review. The primary outcome was nosocomial infection rates. Secondary outcomes included microbial counts on healthcare providers’ hands, mortality rates, patient/hospital cost of treatment of healthcare-associated infections (HCAIs), length of ICU/hospital stays, and adverse events. Studies were independently screened and data extracted by at least two authors. Meta-analyses of risk ratios (RR), incidence rate ratios (IRR), odds ratios (OR) and mean differences (MD), were conducted using the RevMan 5.3 software. Results: Seven studies published between 1992-2009 and involving a total of 11,663 patients were included. Five studies (10,981 patients) contributed data to the ICU acquired nosocomial infection rates. The pooled IRR was 0.71 (95% CI 0.61, 0.82; I2 = 94%). On sensitivity analysis, pooled IRR was 0.39 (95% CI 0.32, 0.48; 4 studies; 8,247 patients; I2 = 0%) in favour of hand rub. The pooled OR for mortality was 0.95 (95% CI 0.78, 1.61; 4 studies; 3,475 patients; I2 = 39%). The pooled MD for length of hospital stay was -0.74 (95% CI -2.83, 1.34; 3 studies; 741 patients; I2 = 0%). The pooled OR for an undesirable skin effect was 0.37 (95% CI 0.23, 0.60; 3 studies;1504 patients; I2 = 0%) in favour of hand rub. Overall quality of evidence was low. Conclusion: Hand rub appeared more effective when compared to handwash in ICUs.


2015 ◽  
Vol 56 (2) ◽  
pp. 140-152 ◽  
Author(s):  
Felipe A. Jain ◽  
Roger N. Walsh ◽  
Stuart J. Eisendrath ◽  
Scott Christensen ◽  
B. Rael Cahn

Sign in / Sign up

Export Citation Format

Share Document