Smart Phone Attacks on the Rise?

September 2009
Security: Solutions for Enterprise Security Leaders;Sep2009, Vol. 46 Issue 9, p18
Trade Publication
The article reports on the Cisco Systems Inc. 2009 Midyear Security Report which indicates that criminals are taking advantage of modern technology to deceive people with their phishing scam through mobile telephones in 2009 in the U.S. The report states that the criminal underground is collaborating to use current events such as swine flu to victimize people. The report also confirmed that there was an increase in these kinds of attack through the use of SMS text messages.


Related Articles

  • Beware of Smishing. Mitra, Kushan // Business Today;12/16/2007, Vol. 16 Issue 25, p34 

    The article presents information related to smishing, which is also known as phishing over short message service (SMS). Smishing is done through SMS wherein a user is asked to visit a particular Web site if he or she wants to unsubscribe a service that has been provided to him by the sender of...

  • CUs Can Be Targets of Text Message Scams.  // Credit Union Newswatch;7/27/2009, p8 

    The article reports on the possibility for credit unions to be the target of text message scams in the U.S. According to Cisco Systems Inc., the result of their research in 2009 states a significant growth of scams which include credit unions as one of the focus of new threats. It says that...

  • Dial P for Phishing. Wolfe, Daniel // American Banker;7/15/2009, Vol. 174 Issue 134, p7 

    The article reports on text-message phishing scams. There has been an increase in phishing scams targeting regional banks and credit unions with victims being chosen by their area codes. According to a report from Cisco Systems Inc. one such scam in Southern California listed a toll-free number...

  • News Bits.  // Network World;8/9/2004, Vol. 21 Issue 32, p6 

    Reports developments related to telecommunications industry in the U.S. as of August 9, 2004. Controversy on the construction of a converged Internet protocol voice and data network by Cisco Systems Inc. in San Jose's city hall; Vote of the U.S. Federal Communications Commission (FCC) to outlaw...

  • Mobile Users' Strategies for Managing Phishing Attacks. El-Din, Rasha Salah; Cairns, Paul; Clark, John // Journal of Management & Strategy;May2014, Vol. 5 Issue 2, p70 

    Phishing is the use of electronic media, like emails and SMS messages, to fraudulently elicit private information or obtain money under false pretence. Though there is considerable interest in phishing as a security problem, there is little previous research from the human factors perspective...

  • Phishers Put Their Lures on Cell Phones. Brandt, Andrew // PCWorld;Jan2007, Vol. 25 Issue 1, p46 

    The article reports that SMiShing, a term coined by researchers for the McAfee security software firm, describes a form of phishing in which the bad guys send an SMS (short message service) message to a person's mobile phone. The first such messages purported to come from dating-service Web...

  • Mobile Banking Security: New Problems and Old Face Emerging Channel. Rapport, Marc // Credit Union Times;9/15/2010, Vol. 21 Issue 35, p19 

    The article explores the mobile banking security (MBS) in the U.S. Mobile banking is seen to create opportunities for consumers and criminals. It states that short messaging service texting through cellular telephones is considered as the most vulnerable of mobile banking channels due to social...

  • Spam on Cell Phones Emerges as a Costly Annoyance. Thuresson, Michael // San Diego Business Journal;6/9/2003, Vol. 24 Issue 23, p20 

    Reveals that spam on cell phones are emerging as costly annoyances. Costs associated with spam text messages; Efforts of wireless carriers to protect their customers from spam messages.

  • Now, Dial an E-Mail. Kirschner, Suzzane Kantra; Everett, Jenny // Popular Science;Aug2002, Vol. 261 Issue 2, p18 

    Provides information on intercarrier messaging, which allows sending text messages directly to any cellular telephone number.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics