Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Study of Mobile Attacks on Different Platform and Its Solutions

Print
PDF
IJCA Proceedings on Leveraging Information Technology for Inter-Sectoral Research
© 2019 by IJCA Journal
ICAIM 2017 - Number 1
Year of Publication: 2019
Authors:
Mohdshadab Shaikh
Digna Parmar
Vinita Gaikwad

Mohdshadab Shaikh, Digna Parmar and Vinita Gaikwad. Article: Study of Mobile Attacks on Different Platform and Its Solutions. IJCA Proceedings on Leveraging Information Technology for Inter-Sectoral Research ICAIM 2017(1):16-17, February 2019. Full text available. BibTeX

@article{key:article,
	author = {Mohdshadab Shaikh and Digna Parmar and Vinita Gaikwad},
	title = {Article: Study of Mobile Attacks on Different Platform and Its Solutions},
	journal = {IJCA Proceedings on Leveraging Information Technology for Inter-Sectoral Research},
	year = {2019},
	volume = {ICAIM 2017},
	number = {1},
	pages = {16-17},
	month = {February},
	note = {Full text available}
}

Abstract

Today, in the increasing dependence on information and communication technologies, especially the Internet and mobile, for communications, one of the biggest problems the world unknowingly facing is that of cybercrimes. When it comes to mobile security, most mobile devices are a target waiting to be attacked. However, security controls are not always implemented on mobile devices, and it is unclear whether consumers are aware of the importance of enabling security controls on their devices. Even common people are not aware about in how many ways their mobile handheld devices can be hacked. There are various types of mobile operating systems available in mobile devices, every mobile operating system have their own security issues.

References

  • Symantec, Internet security threat report 2013, Vol. 18, April 2013.
  • Global Platform Device Technology, TEE Client API Specification Version 1. 0, July 2010.
  • He W. , " A Survey of Security Risks of Mobile Social Media through Blog Mining and an Extensive Literature Search " Information Management and Computer Security , 21 ( 5 ), pp. 381 – 400 ( 2013 ).
  • Huang S. The South Korean Fake Banking AppScam. http://www. trendmicro. com/cloudcontent/us/pdfs/sec urity-intelligence/white-papers/wp-the-south-korean-fake-banking-app-scam. pdf ( Feb. 2015 )
  • G. Morgan , " Mobile malware rises by 155 per cent as Android platform risks grow '', http://www. v3. co. uk/v3-uk/news/2153026/mobilemalware-rises-155-cent-android-platform{###}risks-grow ( Feb. 2012 ).
  • C. Amrutkar, P. Traynor, P. van Oorschot, "An empirical evaluation of security indicators in mobile web browsers", IEEE Transactions on Mobile Computing, vol. 99, pp. 1, 2013.
  • "Mobile cyber threats", Kaspersky Lab and INTERPOL Survey Reports,[online] Available: http://media. kaspersky. com/pdf/Kaspersky-Lab-KSN-Report-mobile-cyberthreats-web. pdf.