123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

The Increasing Threats Of Mobile Security In 2011

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

As the years have passed by, we have seen the increasing growth of the mobile phone industry and how it has shaken or affected the lives of millions of individuals in our planet. In fact, some people couldn't live a normal life without their mobile phones by their side. Other people even have multiple mobile phones just for different purposes, but whether it is for business or personal use, we will never know. But what all of us know is that there is an increase of mobile connectivity nowadays and that there are different mobile phones with access to the internet, which has opened up new avenues to conduct any transactions or use any applications found on the Internet.
Unfortunately, the growth in the mobile phone industry as well the increase of the number how the phones can be used have resulted into an unforeseen problem to many individuals as well as to different industries. This problem is what experts call the threat of malware and other cyber threats on mobile security networks.
According to many security experts, security researchers and any master in information security ...
... /strong>, the threats in mobile security will double in each year; thus we can say that the security attempts, exploits or breaches on mobile phones this year is comparably more than last year. In fact, it has been predicted already, but few paid attention to it and mobile manufacturing companies just continued with their manufacturing processes never thinking about the security features of the phone.
In each year, the global consumerism of the mobile industry has epitomized the importance of bringing your very own mobile device where ever a person may go. As a matter of fact, this idea is common among different companies and institutions because mobile phones with high-connectivity to the Internet as well as the system of the company have raised many security concerns. These mobile devices are very open to different cyber threats like malware because of their security vulnerabilities. Sometimes these devices are excellent avenues in compromising the system and networks of many industries.
The first half of this year alone, there has been a significant increase on the number of mobile devices particularly Android phones and Smart phones that are infected with malicious software and codes. Years ago, ms in information security experts and security researchers were wondering when the malware threat will become a real problem in the newest generation of mobile phones and hand-held devices. Somehow, it appears that the time has come.
A typical mobile phone with internet connectivity or perhaps Smart or Android devices can be infected by mobile malware if the user downloads or purchases certain applications from third-party stores. Sometimes these applications are even found on different peer-to-peer networks. It could even be hosted on certain websites as well as on Usenet. These applications are targeted to individuals who are looking for cracked or pirated versions of the legit applications. What makes this mobile malware more dangerous is that it can be transferred from one phone to another or from the phone to the company's system because of these phones connectivity.
Although there has been an increase of mobile threats, researchers and masters degree in information security experts have found that in the first half of the year 2011, there has been a decrease of vulnerabilities on different applications found on the Web. From 2010's 49 percent, it is now all down to just 37 percent. In fact, for the past five years, this has been the only decrease of vulnerabilities of Web applications ever recorded. Furthermore, since the year 2007, all the crucial and high vulnerabilities in browsers are at the lowest point ever.
Researchers have tested hundred of websites, from Fortune 500 sites to other popular sites as well. They have discovered that almost 40 percent of these websites have client-side vulnerabilities on their JavaScript. And unfortunately, there has been a significant increase of spear phishing on large industries, organizations and institutions – or simply called whaling.
The number of threats in the security of networks in various companies and industries challenges each and every company or industry. Although these threats are real, companies know different ways to deter any cyber plots against them. But the increasing threats coming from mobile malware is a different story.

EC-Council University is a licensed university that offers degrees and master's degrees on Security Science online. The degrees are recognized worldwide and may be used in any employment worldwide as well as the graduate certificates that they offer. With excellence and dedication as the core values, many professionals and degree holders have benefitted from undergoing the programs in this university.
More information about master's degrees in information security available at www.eccuni.us.

Total Views: 186Word Count: 779See All articles From Author

Add Comment

Computers Articles

1. How To Improve The Security Of Android App?
Author: goodcoders

2. How To Earn Money From Free Apps?
Author: goodcoders

3. How Artificial Intelligence Is Revolutionizing Accounting?
Author: goodcoders

4. Explain About Web Application Architecture: Components, Types, Best Practices
Author: goodcoders

5. Complete Guide To Fitness App Development
Author: goodcoders

6. Erp For Small And Big Enterprise
Author: AITS Software

7. Top Software Development Company Melbourne
Author: Technothinksup Solutions

8. The Devops Revolution: Accelerating Innovation In The Digital Age
Author: basheer ansari shaik

9. How Ai Is Transforming Software Development
Author: Technothinksup Solutions

10. How To Do Web Scraping With Ruby?
Author: goodcoders

11. How Mobile Apps Blooming In The Fashion Industry?
Author: goodcoders

12. How Cloud Computing Helps In The Field Of Mobile App Development?
Author: goodcoders

13. The Importance Of Cybersecurity In The Digital Age
Author: Mohammad Arsh

14. First-ever ‘identity Management Day’ Is April 13, 2021
Author: Reinfosec

15. Top 5 Project Management Software Of 2025
Author: Ben Gross

Login To Account
Login Email:
Password:
Sign Up Newsletter
Email Address: