wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Smartphone Security: Vulnerabilities and Attacks

profile
Srinidhi Shetty
Oct 20, 2021
0 Likes
0 Discussions
71 Reads


Application in the smartphones have become in the recent years. Smartphone have provided many services like mobile payment system, application market(i.e playstore). Also the no of vulnerabilities of application is also increasing. so in this research i had tried to cover the Vulnerabilities & solutio for smartphone security.

 

Smartphone provide many feature as a result they have become perfect target for different virues & Vulnerabilities. According to a research study 80-90% android mobiles in market are more vulnerable to security issues than IOS in Iphone.

 

Smartphone OS : is a system software that run on smartphone & allows them to execute the applications.

 

Smartphone OS Feature : Since every OS provides different features they can provide camera, fingerprint, sensor support as well as works with hardware features also.

 

Types of OS : Android & IOS
These 2 OS are majorly used OS.Both the OS have 4 layers.

 

Android
Linux Kernel -In charge for power management,  Virtual memory & network
Libraries - different libraries have differnt function in Andriod mostly libraries are java based.
Java API framework - used for creating Androi Application
System Apps - since it supports 3rd party application also there are different layers in android security like
security at OS level, Mandatory application sandbox, secure inter process, Application signing, Application-defined & user-granted.

 

IOS
Core OS - low level feature like bluetooth framework.
Core Service-high level feature like cloud kit framework 
Media Layer -includes game kit helps in using music,animation, videos etc.
Cocoa Touch - framework used for creating IOS application

 

MALICIOUS ATTACKS - below are few malicious attacks
Malicious Applications - Malware,Virus,Spyware,Trojan
Software Vulnerabilities - Adware apps, Fake apps, Backdoor
Threats or Attacks - Social Engineering, Phishing app, Man-In-The-Middle (MITM), Mobile botnet

 

MOST WANTED MOBILE MALWARE FAMILIES
Triada is one of the most wanted malware which was supported on Android OS.This malware uses a backdoor to infect OS processes and provides a remote access for stealing money from users.

 

SECURITY SOLUTIONS FOR SMARTPHONES
Malware Detection Techniques -Signature based techniques, Machine learning based techniques

 

Countermeasures against Malware -The users’ knowledge about Smartphones malicious risks, Install apps from trusted sources, The security of wireless networks, Prevent Root (Android) and Jailbreaking (iOS), Keep smartphone OS up to date, Encrypt Smartphone, Encourage Smartphone Users to Install Mobile Security Software

 

CONCLUSION -we examined current viable solutions for smartphone users by concentrating on existing mechanisms, and we proposed some future paths for cyber security experts to enhance this study field.


Comments ()


Sign in

Read Next

Metasploit

Blog banner

IP ADDRESS

Blog banner

Data Exfiltration

Blog banner

How to Conquer Depression ?

Blog banner

Teamwork

Blog banner

Sniffing: A Cyber Security Threat

Blog banner

DURGA POOJA

Blog banner

Retiring ISS

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

Mumbai Metro 3

Blog banner

The Memory Hierarchy

Blog banner

Article on Fresh Book

Blog banner

Multicore CPUs

Blog banner

Explain website hacking issues

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Remote Work in 2026

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

GUIDE TO GIS

Blog banner

Modern Teaching Methods: Why Inquiry-based & Experiential Learning Works Best

Blog banner

File Sharing

Blog banner

Marvel Cinematic Universe

Blog banner

Uniprocessor Scheduling

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

Partnership in Learning: How Parent Involvement Shapes a Child’s Early Education

Blog banner

ARTICLE ON WRIKE CORPORATION

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

Malware Defense

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

Pandas Matrix Applications

Blog banner

Deadlock

Blog banner

You'll get to know about Pankaj Negi

Blog banner

Emotional Intelligence in Children: Why It Is as Important as Academics

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

Cherish the Craft — Essential Tips to Maintain Your Patola Collection

Blog banner

A Short History of GIS

Blog banner

Why You Should Not Use Free VPNs

Blog banner

Modern operating system

Blog banner

Direct Memory Access

Blog banner

Fault tolerance

Blog banner

evolution of operating system - Disha Parekh

Blog banner

My Favorite Sportsperson

Blog banner

Cloud Computing: Threats and Vulnerabilities

Blog banner