ATTACKS on mobile – geeksforjobs


Hey all, Welcome to Geeksforjobs

Mobile phones have become an integral part of everyone’s life and mobile phones have transformed from a luxury to a bare necessity. Mobile phone theft has increased dramatically over the years. Since a large section of the working population in India uses public transport, the major places where theft takes place are bus stops, railway stations and traffic signals. Many insurance companies have stopped offering mobile theft insurance due to a large number of false claims. When anyone loses their mobile phone, anything is “contact list” and “Personally Identifiable Information (PII)”, which is actually lost. One might have thought that his cell phone is much safer than a personal computer, which is attacked very often by viruses. However, the perpetrators gave the idea a false statement. Cell phones have been the new playground after personal computers (ie, attackers), due to the increasing use of cell phones and the variability of the Internet through cell phones. Another reason is the widespread use of cell phones in youth with increasing demand for WiFi zones in metros and lack of awareness / knowledge about technology weaknesses. The following factors contribute to the outbreak on mobile devices:

1. Base Target Terminal: Enough terminal or more equipment to attack.

2.ENUHH function: 200 extended functionality ie, office functionality and applications also increase the portability of malware.

3.ENOUHH Connectivity: Smartphones provide many communication options such as SMS, MMS, synchronization, Bluetooth, infrared (IR) and WLAN connections.

Examples of Mobile ATTACKS:

Mobile Virus: A mobile virus is similar to a computer virus that targets mobile phone data or applications / software installed in it. Nowadays virus attacks on mobile devices are no longer an exception or proof of concept. In total, 40 mobile virus families and more than 300 (+) mobile viruses have been identified. The first mobile virus was identified in 2004. Mobile viruses spread through two major communication protocols. Bluetooth and MMS Bluetooth viruses can easily be spread over a range of 10–30 meters through Bluetooth activated phones. The MMS virus can send a copy of itself to everyone. Mobile users whose numbers are available in the infected mobile phone’s address book.333 There are some tips to protect mobiles from mobile malware attacks: Download or accept programs, content. If the mobile is equipped with Bluetooth, turn it off or set it to non-discoverable mode. When it is not in use and / or does not need to be used. If the mobile is equipped with a beam (ie, IR), allow it to receive only the incoming beam from a reliable source. Download and install antivirus software for mobile devices. And there are some more examples and they are doing well.

Leave a Comment

Your email address will not be published. Required fields are marked *