z-logo
open-access-imgOpen Access
Mobile Devices Vulnerabilities
Author(s) -
Melissa A. Schneider,
Minhaz Chowdhury,
Shadman Latif
Publication year - 2022
Publication title -
epic series in computing
Language(s) - English
Resource type - Conference proceedings
SCImago Journal Rank - 0.21
H-Index - 7
ISSN - 2398-7340
DOI - 10.29007/kg5j
Subject(s) - mobile device , computer security , computer science , popularity , mobile computing , internet privacy , secure coding , mobile telephony , mobile radio , computer network , information security , world wide web , software security assurance , security service , psychology , social psychology
With the increase in popularity of mobile devices for personal and business reasons, they have become even more attractive targets to malicious actors. There are many vulnerabilities with any mobile device, though some environments, features, and operating systems are at higher risk than others for certain attacks. This paper discusses such vulnerabilities, including the elements that allow them, methods of exploiting them, and one might combat attacks on mobile devices.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here