123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Mobile Phone Security Will Become A Major Threat If The Security And Privacy Of Smart Phones Are Not

Profile Picture
By Author: EC-COUNCIL
Total Articles: 68
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Recent mobile phone hacking scandal has throwned a spotlight on mobile security.It is estimated that the potential victims of the phone hacking ran to thousands, and involved government ministers, police and defense chiefs.
Charlotte Harris, who is representing several of the celebrities involved, said 7,000 people may have had their mobile phone voicemail messages intercepted by The News of the World. It is reported that the hacking took place between 2004 and 2006.
Last week, News International,which publishes the News of the World, apologized for voicemail messages left on mobile phones being hacked on behalf of the News of the World. News International said it had approached another nine people who claimed to be victims of phone hacking, asking them for more evidence. One person familiar with the situation said the nine included Steve Coogan, the comedian, Leslie Ash, the actress, and Paul Gascoigne, the former footballer, ex-member of parliament George Galloway, and actor Jude Law's personal assistant Ben Jackson.
Now the scope of the scandal has expanded. At least 24 people who claim they are victims ...
... in the phone hacking affair have initiated civil cases against News International, which is expected to pay millions of pounds in compensation.
The media conglomerate, owned by Rupert Murdoch, said in a statement that it would set up a fund to compensate those affected. That said, past behavior at the News of the World in relation to voicemail interception is a matter of genuine regret. It is now apparent that our previous inquiries failed to uncover important evidence and we acknowledge our actions then were not sufficiently robust.
News International has offered to pay compensation to eight public figures, including actress Sienna Miller and Tessa Jowell, the former Labour minister.
In a 2007 court case, Clive Goodman, the royal correspondent to the News of the World was jailed after he admitted hacking into the messages of model Elle MacPherson as well as members of the royal household. In January Andy Coulson, prime minister David Cameron's spokesman, stepped down amid speculation he had known about the hacking, despite denying that he was involved. Coulson was the editor of the News of the World newspaper in 2007 when Goodman and private investigator Glenn Mulcaire were sentenced to prison for hacking into voice mails of members of the royal family's staff.
The security and privacy of smart phones may not be very secure as the last couple of years smartphones have been under increasing attack. "The smartphone OS will become a major security target," said Android Security Leader Rich Cannings. Attackers can already hit millions of victims with a smartphone attack, and soon that number will be even larger. "Personally I think this will become an epiphany to malware authors," he said.
Cyber criminals generally steered clear of mobile devices because currently Microsoft's Windows operating system is the prime target of criminal attacks today. Security experts say that this is because mobile phones haven't traditionally stored a lot of sensitive data, and because there are so many different devices to attack, it's hard to create a single virus that can infect a large number of users.
Phone manufacturers or IT professionals working with these corporations need to do their part to keep these smart devises safe. One way to mitigate security breaches is with technical security training. Information security professionals can increase their information security knowledge and skills by embarking on highly technical and advanced training programs. EC-Council has launched the Center of a Advanced Security Training (CAST), to address the deficiency of highly technically skilled information security professionals.
CAST will provide advanced technical security training covering topics such as Advanced Penetration Testing, Digital Mobile Forensics, Advanced Application Security, Advanced Network Defense, and Cryptography. These highly technical and advanced information security training will be offered at all EC-Council hosted conferences and events, and through specially selected EC-Council Authorized Training Centers.
ABOUT EC-COUNCIL
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (CEH) course, Computer Hacking Forensics Investigator (CHFI) program, License Penetration Tester (LPT) program and various other information security training programs offered in over 60 countries around the globe. EC-Council has trained over 80,000 individuals in technical security training and certified more than 30,000 security professionals. EC-Council has launched the Center of Advanced Security Training (CAST), to address the deficiency in the lack of highly technically skilled information security professionals.

Total Views: 252Word Count: 760See All articles From Author

Add Comment

Computers Articles

1. Rsgoldfast Runescape Gold:fishing
Author: RuneScape gold

2. Understanding Mobile Intranet Workflow
Author: goodcoders

3. How To Personalize Your Mobile Ux?
Author: goodcoders

4. How To Optimize The Fintech Software Release Management Process
Author: goodcoders

5. Data Recovery Services Near Me: Your Ultimate Guide To Retrieving Lost Data
Author: adeel khan

6. Top 5 Data Cleansing Tools Of 2025
Author: Ben Gross

7. Come Ottenere Una Licenza Windows 11 In Italia: Guida Completa
Author: LicensePlanet

8. How To Build A Strong Brand Identity With Graphic Design
Author: dnd teams

9. Exploring The Generative Ai Market: Trends, Growth Drivers, And Future Outlook
Author: simran

10. Microsoft Dynamics 365 Vs Salesforce – Comparisons (2025)
Author: Maria

11. Top 5 Influencer Marketing Software Of 2025
Author: Ben Gross

12. Augmented Reality And Its Role In Manufacturing
Author: goodcoders

13. Effortless Environment Tracking With Tempgenius: Wifi Humidity Monitoring And Wireless Data Loggers
Author: Chris Miller

14. Sales Technology Trends That Will Impact Your Business In 2025
Author: Ben Gross

15. Infrastructure Management: Ensuring Efficiency And Sustainability
Author: ServerLT

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: