TITLE

Smartphone security threats jump in 2010

AUTHOR(S)
LUNA, LYNNETTE
PUB. DATE
January 2011
SOURCE
Urgent Communications;Jan2011, Vol. 29 Issue 1, p7
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reveals a report by a company called Adaptive Mobile which tells that smartphone security threats have increased in 2010. Mobile malware on smartphones went up to 33 per cent from 2009 to 2010. Phones that are enabled by the Google Android platform have been hugely hit by malware. The continued growth of smartphones is seen as one reason why malware exploits are centered into these types of phones. Also discussed is the iPad being a catalyst of the growth in mobile productivity and corporate applications.
ACCESSION #
57578204

 

Related Articles

  • Malware Affects Apple Users.  // Micro Mart;Nov2014, Issue 1338, p67 

    The article reports on a malware that affects Apple's iPhone smartphones and iPad computers in China by infecting apps available for the devices.

  • COMPUTERS/SOFTWARE.  // Enterprise/Salt Lake City;10/18/2010, Vol. 40 Issue 15, p4 

    The article previews the Power.ME, a mobile productivity solution for the iPad and iPhone, from AppTime.

  • Mobile malware will test Android and iPhone. Antonopoulos, Andreas // Network World;1/18/2010, Vol. 27 Issue 2, p18 

    The article focuses on the author's views on the emergence of mobile malware which he believes will test Android and iPhone platforms in 2010 in the U.S. The author asserts that smartphone software platforms and devices have become flexible enough to allow self-propagating malware. He mentions a...

  • Lock Down Your Android Devices. Bradley, Tony // PCWorld;Jan2011, Vol. 29 Issue 1, p33 

    This article discusses how to ensure security of cellular telephones and smartphones that use the Android mobile operating system (OS). It stresses the need for security measures as the OS lacks the remote-tracking capability and the ability to impose standard sets of applications or other...

  • TAXONOMY: MOBILE MALWARE THREATS AND DETECTION TECHNIQUES. Dua, Lovi; Bansal, Divya // International Journal of Computer Science & Information Technolo;2014, Vol. 6 Issue 4, p213 

    Since last-decade, smart-phones have gained widespread usage. Mobile devices store personal details such as contacts and text messages. Due to this extensive growth, smart-phones are attracted towards cyber-criminals. In this research work, we have done a systematic review of the terms related...

  • Virus Propagation in Heterogeneous Bluetooth Networks with Human Behaviors. Jackson, Jennifer T.; Creese, Sadie // IEEE Transactions on Dependable & Secure Computing;Dec2012, Vol. 9 Issue 6, p930 

    The growth in the use of Smartphones and other mobile computing devices continues to grow rapidly. As mobile wireless communications become ubiquitous, the networks and systems that depend upon them will become more complex. In parallel with this, the spread of digital viruses and malicious...

  • Mobile security -- more than a solution looking for a problem. Brehm, James; Ayoub, Rob // RCR Wireless News;2/18/2008, Vol. 27 Issue 4, p16 

    The article presents an outlook for the opportunities, challenges and trends facing the mobile security industry in 2008. Notable developments in the security of mobile applications and services are expected during the year. These developments will be spurred on lifestyle and usage changes...

  • Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals. Igor, Zhukov; Dmitry, Mikhaylov; Andrey, Starikovskiy; Dmitry, Kuznetsov; Anastasia, Tolstaya; Alexander, Zuykov // International Journal of Computer Network & Information Security;Apr2013, Vol. 5 Issue 5, p1 

    This paper deals with the description of the threats to mobile devices and suggests the security software that provides comprehensive protection of personal data and mobile telephone from malware and illegal activity of cyber criminals. The developed security software Green Head protects...

  • BEYOND THEORY. Kaplan, Dan // SC Magazine: For IT Security Professionals (15476693);Oct2011, Vol. 22 Issue 10, p30 

    The article examines enterprise readiness against mobile malware attacks. Security experts infer that the increasing number of smartphone users have motivated cyber criminals to develop malware for mobile devices like the Cabir worm in 2004 and the RedBrowser virus in 2006. It notes that the...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics