CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Study of Mobile Attacks on Different Platform and Its Solutions

Published on February 2019 by Mohdshadab Shaikh, Digna Parmar, Vinita Gaikwad
Leveraging Information Technology for Inter-Sectoral Research
Foundation of Computer Science USA
ICAIM2017 - Number 1
February 2019
Authors: Mohdshadab Shaikh, Digna Parmar, Vinita Gaikwad
4fbb042f-9fa2-4cc9-9c51-8430738eb650

Mohdshadab Shaikh, Digna Parmar, Vinita Gaikwad . Study of Mobile Attacks on Different Platform and Its Solutions. Leveraging Information Technology for Inter-Sectoral Research. ICAIM2017, 1 (February 2019), 16-17.

@article{
author = { Mohdshadab Shaikh, Digna Parmar, Vinita Gaikwad },
title = { Study of Mobile Attacks on Different Platform and Its Solutions },
journal = { Leveraging Information Technology for Inter-Sectoral Research },
issue_date = { February 2019 },
volume = { ICAIM2017 },
number = { 1 },
month = { February },
year = { 2019 },
issn = 0975-8887,
pages = { 16-17 },
numpages = 2,
url = { /proceedings/icaim2017/number1/30384-1708/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Leveraging Information Technology for Inter-Sectoral Research
%A Mohdshadab Shaikh
%A Digna Parmar
%A Vinita Gaikwad
%T Study of Mobile Attacks on Different Platform and Its Solutions
%J Leveraging Information Technology for Inter-Sectoral Research
%@ 0975-8887
%V ICAIM2017
%N 1
%P 16-17
%D 2019
%I International Journal of Computer Applications
Abstract

Today, in the increasing dependence on information and communication technologies, especially the Internet and mobile, for communications, one of the biggest problems the world unknowingly facing is that of cybercrimes. When it comes to mobile security, most mobile devices are a target waiting to be attacked. However, security controls are not always implemented on mobile devices, and it is unclear whether consumers are aware of the importance of enabling security controls on their devices. Even common people are not aware about in how many ways their mobile handheld devices can be hacked. There are various types of mobile operating systems available in mobile devices, every mobile operating system have their own security issues.

References
  1. Symantec, Internet security threat report 2013, Vol. 18, April 2013.
  2. Global Platform Device Technology, TEE Client API Specification Version 1. 0, July 2010.
  3. He W. , " A Survey of Security Risks of Mobile Social Media through Blog Mining and an Extensive Literature Search " Information Management and Computer Security , 21 ( 5 ), pp. 381 – 400 ( 2013 ).
  4. Huang S. The South Korean Fake Banking AppScam. http://www. trendmicro. com/cloudcontent/us/pdfs/sec urity-intelligence/white-papers/wp-the-south-korean-fake-banking-app-scam. pdf ( Feb. 2015 )
  5. G. Morgan , " Mobile malware rises by 155 per cent as Android platform risks grow '', http://www. v3. co. uk/v3-uk/news/2153026/mobilemalware-rises-155-cent-android-platform{###}risks-grow ( Feb. 2012 ).
  6. C. Amrutkar, P. Traynor, P. van Oorschot, "An empirical evaluation of security indicators in mobile web browsers", IEEE Transactions on Mobile Computing, vol. 99, pp. 1, 2013.
  7. "Mobile cyber threats", Kaspersky Lab and INTERPOL Survey Reports,[online] Available: http://media. kaspersky. com/pdf/Kaspersky-Lab-KSN-Report-mobile-cyberthreats-web. pdf.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Phones Hacking Cell Phones Attacks