Smart Phone Attack Essay

1186 Words3 Pages

We know the ‘PC era’ is replaced by a ‘Smart-phone’ era, when we see almost every hand holding on to a smart-phone these days. The PC sales have persistently nose-dived, ever since the users were introduced to the smart-phones and their advanced capabilities. Smart-phones being less expensive and more convenient when compared to the clunky desktop computers, almost immediately became striking alternatives to access the Internet anywhere, anytime.
However, smart-phone’s rapidly multiplying popularity was and is a sharp contrast to its relatively lax security. This makes the smart-phone user an attractive target for cyber attackers. As per the reports, smart-phones have out sold PCs, and this expanding market of smart-phones is conveniently being exploited by the attackers. They have been merging the old techniques with new tricks to attack the smart mobile devices. Total number of attacks on mobile phones along with the sophistication involved is increasing every day, but the counter-measures to prevent these attacks are slow to catch up.
Smart-phones have enabled its users an instant access to the Internet, e-mail, etc. They are also being used for varied activities like social networking, using online banking services, e-shopping and countless mobile applications. But unlike the conventional computer security which always had firewalls and anti-virus measures regularly updated, the smart-phone security has failed to keep up with the pace. Unfortunately, a majority of smart-phone users fail to understand the consequences of such security shortcomings.
Reasons behind the typical smart-phone cyber attacks
Smart mobile devices happen to share most of the vulnerabilities of PCs. But the lack of suitable security measures and few su...

... middle of paper ...

... report the incidence of loss or to the local authorities in charge.
 Change all the login credentials of corporate networks or social networking sites from the stolen device. This may require you to contact your IT department or
 Some mobile service providers also offer the feature of ‘remote wiping’. This allows the smart-phone users to remotely delete all the data stored on your device.
According to security firm Kasperskey Lab, numbers of malicious software that target mobile devices have increased a lot this year. In 2013 alone, nearly 100,000 new malicious programs for mobile devices were detected, which is almost double with the number recorded last year in 2012. As of Jan 2014, the security lab has collected about 143,211 mobile malware samples. These statistics should be alarming enough for all the users to play it safe when using those smart-devices.

More about Smart Phone Attack Essay

Open Document