123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Mobile Phone Security Will Become A Major Threat If The Security And Privacy Of Smart Phones Are Not

Profile Picture
By Author: EC-COUNCIL
Total Articles: 68
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Recent mobile phone hacking scandal has throwned a spotlight on mobile security.It is estimated that the potential victims of the phone hacking ran to thousands, and involved government ministers, police and defense chiefs.
Charlotte Harris, who is representing several of the celebrities involved, said 7,000 people may have had their mobile phone voicemail messages intercepted by The News of the World. It is reported that the hacking took place between 2004 and 2006.
Last week, News International,which publishes the News of the World, apologized for voicemail messages left on mobile phones being hacked on behalf of the News of the World. News International said it had approached another nine people who claimed to be victims of phone hacking, asking them for more evidence. One person familiar with the situation said the nine included Steve Coogan, the comedian, Leslie Ash, the actress, and Paul Gascoigne, the former footballer, ex-member of parliament George Galloway, and actor Jude Law's personal assistant Ben Jackson.
Now the scope of the scandal has expanded. At least 24 people who claim they are victims ...
... in the phone hacking affair have initiated civil cases against News International, which is expected to pay millions of pounds in compensation.
The media conglomerate, owned by Rupert Murdoch, said in a statement that it would set up a fund to compensate those affected. That said, past behavior at the News of the World in relation to voicemail interception is a matter of genuine regret. It is now apparent that our previous inquiries failed to uncover important evidence and we acknowledge our actions then were not sufficiently robust.
News International has offered to pay compensation to eight public figures, including actress Sienna Miller and Tessa Jowell, the former Labour minister.
In a 2007 court case, Clive Goodman, the royal correspondent to the News of the World was jailed after he admitted hacking into the messages of model Elle MacPherson as well as members of the royal household. In January Andy Coulson, prime minister David Cameron's spokesman, stepped down amid speculation he had known about the hacking, despite denying that he was involved. Coulson was the editor of the News of the World newspaper in 2007 when Goodman and private investigator Glenn Mulcaire were sentenced to prison for hacking into voice mails of members of the royal family's staff.
The security and privacy of smart phones may not be very secure as the last couple of years smartphones have been under increasing attack. "The smartphone OS will become a major security target," said Android Security Leader Rich Cannings. Attackers can already hit millions of victims with a smartphone attack, and soon that number will be even larger. "Personally I think this will become an epiphany to malware authors," he said.
Cyber criminals generally steered clear of mobile devices because currently Microsoft's Windows operating system is the prime target of criminal attacks today. Security experts say that this is because mobile phones haven't traditionally stored a lot of sensitive data, and because there are so many different devices to attack, it's hard to create a single virus that can infect a large number of users.
Phone manufacturers or IT professionals working with these corporations need to do their part to keep these smart devises safe. One way to mitigate security breaches is with technical security training. Information security professionals can increase their information security knowledge and skills by embarking on highly technical and advanced training programs. EC-Council has launched the Center of a Advanced Security Training (CAST), to address the deficiency of highly technically skilled information security professionals.
CAST will provide advanced technical security training covering topics such as Advanced Penetration Testing, Digital Mobile Forensics, Advanced Application Security, Advanced Network Defense, and Cryptography. These highly technical and advanced information security training will be offered at all EC-Council hosted conferences and events, and through specially selected EC-Council Authorized Training Centers.
ABOUT EC-COUNCIL
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (CEH) course, Computer Hacking Forensics Investigator (CHFI) program, License Penetration Tester (LPT) program and various other information security training programs offered in over 60 countries around the globe. EC-Council has trained over 80,000 individuals in technical security training and certified more than 30,000 security professionals. EC-Council has launched the Center of Advanced Security Training (CAST), to address the deficiency in the lack of highly technically skilled information security professionals.

Total Views: 231Word Count: 760See All articles From Author

Add Comment

Computers Articles

1. Redefine Customer Experiences Through Progressive Web Apps
Author: Elite_m_commerce

2. All You Need To Know About Mist Computing
Author: TechDogs

3. A Quick Guide To Community Cloud Implementation
Author: TechDogs

4. Top 10 Aws Services List
Author: Top 10 AWS Services List

5. Mastering Cfd Preprocessing: Key Steps For Accurate Simulation Results
Author: cfdsupport

6. Elevate Your Online Presence With Custom Website Design And Expert Woocommerce Developers In Sydney
Author: Amelia Thompson

7. Lexicon Systems: Your Solution For Computer Rentals In Chennai
Author: Hubraseo

8. Aws Vs Azure Vs Google Cloud: Best Suitable Cloud Service Provider For Your Business
Author: goodcoders

9. Top 7 Reasons Why Your Business Needs Firewall?
Author: goodcoders

10. Top 9 Benefits Of Using Laravel Framework For Web App
Author: goodcoders

11. Top 8 Flutter Devtools To Enhance Your App Development Process
Author: goodcoders

12. How To Choose The Best Usb-c Hub For Your Devices: A Guide For Businesses
Author: computer accessories wholesale

13. India's Semiconductor Growth Supported By Solutions From The Busch Group
Author: Busch Vacuum Solutions

14. Video Editing Tips
Author: premiereboyz.online Ratnesh Yadav

15. 5 Reasons Your Project Needs A Business Analyst
Author: 5 Reasons Your Project Needs A Business Analyst

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: