DocumentCode :
813011
Title :
Mobile phones: the next frontier for hackers?
Author :
Leavitt, Neal
Volume :
38
Issue :
4
fYear :
2005
fDate :
4/1/2005 12:00:00 AM
Firstpage :
20
Lastpage :
23
Abstract :
Security experts are finding a growing number of viruses, worms, and Trojan horses that target cellular phones. Security researchers´ attack simulations have shown that before long, hackers could infect mobile phones with malicious software that deletes personal data or runs up a victim´s phone bill by making toll calls. The attacks could also degrade or overload mobile networks, eventually causing them to crash. And they could be even more insidious in the future by stealing financial data. Smart phones represent a particular risk. They offer Internet connectivity, function like minicomputers, and can download applications or files, some of which could carry malicious code. Mobile-device technology is still relatively new, and vendors have not developed mature security approaches. To counter the growing threat, antivirus companies have stepped up their research and development. In addition, vendors of phones and mobile operating systems are looking for ways to improve security.
Keywords :
cellular radio; invasive software; telecommunication security; Trojan horses; cellular phone viruses; hackers; mobile phones; security; Cellular phones; Computer crashes; Computer hacking; Computer viruses; Data security; Degradation; Internet; Invasive software; Mobile handsets; Smart phones; cell phones; malware; viruses; wireless security;
fLanguage :
English
Journal_Title :
Computer
Publisher :
ieee
ISSN :
0018-9162
Type :
jour
DOI :
10.1109/MC.2005.134
Filename :
1432639
Link To Document :
بازگشت