-
Essay / Mobile Device Attacks - 1627
Mobile Device Attacks Mobile devices are more prevalent today than ever. In fact, the increase in power and speed of mobile processors, advances in mobile operating systems, and the considerable appeal of mobile broadband make cell phones and tablets the best candidates for mobile computing devices ( Wong, 2010). However, with this increased use, both by the general population and by businesses, the need for safety and awareness of the risks inherent in their use is paramount. Unfortunately, what makes mobile devices so valuable also makes them more vulnerable to attacks. According to the US Computer Emergency Readiness Team (2011), between 2009 and 2010, “the number of new vulnerabilities in mobile operating systems [increased] by 42%” (Ruggiero & Foote). Additionally, the sophistication of attacks is increasing while new countermeasures are harder to come by. By being aware of the risk involved and taking appropriate measures, consumers can rely on their mobile devices to provide them with the convenience they seek while protecting their vital information from prying eyes. Cyber Threats to Mobile Phones Today, people use smartphones, tablets and other mobile devices for an increasing number of activities, including banking and paying bills, and are increasingly relying on them for storing valuable personal information, such as contact details, emails and even passwords. Social apps abound and many store personal information and stay connected, opening the door to hacker attacks. Perhaps the most valuable asset of a mobile device is its greatest weakness: ease of theft. Most security features on mobile devices are rudimentary and a determined hacker has plenty of time...... middle of paper ...... retrieved from: http://www.bankinfosecurity.com/ top-threats-to-mobile -devices-a-5928?rf=2013-07-23-eb&elq=8c204741e97e4394b751e6a762e2cce6&elqCampaignId=7326Ruggiero, P. & Foote, J. (2011.) “Cyber threats to mobile phones”. Retrieved from: https://www.us-cert.gov/sites/default/files/publications/cyber_threats-to_mobile_phones.pdfSawyer, JH (April 10, 2013.) “Mobile Device Threat Trends.” Retrieved from: http://www.darkreading.com/mobile/trends-in-mobile-device-threats/240152580 Verkooij, K. and Spruit, M. (2013). Mobile Business Intelligence: Key Considerations for Implementation Projects. The Journal of Computer Information Systems, 54(1), 23-33. Retrieved from http://search.proquest.com/docview/1471047566?accountid=8289 Wong, KY (2010). Cell phones as mobile computing devices. Computer Professional Magazine, 12(3), 40-45. doi:http://dx.doi.org/10.1109/MITP.2010.46