
Mobile Devices Vulnerabilities
Author(s) -
Melissa A. Schneider,
Minhaz Chowdhury,
Shadman Latif
Publication year - 2022
Publication title -
epic series in computing
Language(s) - English
Resource type - Conference proceedings
SCImago Journal Rank - 0.21
H-Index - 7
ISSN - 2398-7340
DOI - 10.29007/kg5j
Subject(s) - mobile device , computer security , computer science , popularity , mobile computing , internet privacy , secure coding , mobile telephony , mobile radio , computer network , information security , world wide web , software security assurance , security service , psychology , social psychology
With the increase in popularity of mobile devices for personal and business reasons, they have become even more attractive targets to malicious actors. There are many vulnerabilities with any mobile device, though some environments, features, and operating systems are at higher risk than others for certain attacks. This paper discusses such vulnerabilities, including the elements that allow them, methods of exploiting them, and one might combat attacks on mobile devices.