123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

The Increasing Threats Of Mobile Security In 2011

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

As the years have passed by, we have seen the increasing growth of the mobile phone industry and how it has shaken or affected the lives of millions of individuals in our planet. In fact, some people couldn't live a normal life without their mobile phones by their side. Other people even have multiple mobile phones just for different purposes, but whether it is for business or personal use, we will never know. But what all of us know is that there is an increase of mobile connectivity nowadays and that there are different mobile phones with access to the internet, which has opened up new avenues to conduct any transactions or use any applications found on the Internet.
Unfortunately, the growth in the mobile phone industry as well the increase of the number how the phones can be used have resulted into an unforeseen problem to many individuals as well as to different industries. This problem is what experts call the threat of malware and other cyber threats on mobile security networks.
According to many security experts, security researchers and any master in information security ...
... /strong>, the threats in mobile security will double in each year; thus we can say that the security attempts, exploits or breaches on mobile phones this year is comparably more than last year. In fact, it has been predicted already, but few paid attention to it and mobile manufacturing companies just continued with their manufacturing processes never thinking about the security features of the phone.
In each year, the global consumerism of the mobile industry has epitomized the importance of bringing your very own mobile device where ever a person may go. As a matter of fact, this idea is common among different companies and institutions because mobile phones with high-connectivity to the Internet as well as the system of the company have raised many security concerns. These mobile devices are very open to different cyber threats like malware because of their security vulnerabilities. Sometimes these devices are excellent avenues in compromising the system and networks of many industries.
The first half of this year alone, there has been a significant increase on the number of mobile devices particularly Android phones and Smart phones that are infected with malicious software and codes. Years ago, ms in information security experts and security researchers were wondering when the malware threat will become a real problem in the newest generation of mobile phones and hand-held devices. Somehow, it appears that the time has come.
A typical mobile phone with internet connectivity or perhaps Smart or Android devices can be infected by mobile malware if the user downloads or purchases certain applications from third-party stores. Sometimes these applications are even found on different peer-to-peer networks. It could even be hosted on certain websites as well as on Usenet. These applications are targeted to individuals who are looking for cracked or pirated versions of the legit applications. What makes this mobile malware more dangerous is that it can be transferred from one phone to another or from the phone to the company's system because of these phones connectivity.
Although there has been an increase of mobile threats, researchers and masters degree in information security experts have found that in the first half of the year 2011, there has been a decrease of vulnerabilities on different applications found on the Web. From 2010's 49 percent, it is now all down to just 37 percent. In fact, for the past five years, this has been the only decrease of vulnerabilities of Web applications ever recorded. Furthermore, since the year 2007, all the crucial and high vulnerabilities in browsers are at the lowest point ever.
Researchers have tested hundred of websites, from Fortune 500 sites to other popular sites as well. They have discovered that almost 40 percent of these websites have client-side vulnerabilities on their JavaScript. And unfortunately, there has been a significant increase of spear phishing on large industries, organizations and institutions – or simply called whaling.
The number of threats in the security of networks in various companies and industries challenges each and every company or industry. Although these threats are real, companies know different ways to deter any cyber plots against them. But the increasing threats coming from mobile malware is a different story.

EC-Council University is a licensed university that offers degrees and master's degrees on Security Science online. The degrees are recognized worldwide and may be used in any employment worldwide as well as the graduate certificates that they offer. With excellence and dedication as the core values, many professionals and degree holders have benefitted from undergoing the programs in this university.
More information about master's degrees in information security available at www.eccuni.us.

Total Views: 174Word Count: 779See All articles From Author

Add Comment

Computers Articles

1. Exploring How Ai In The Cloud Can Transform Your Business
Author: TechDogs

2. The Power Of Cloud And Ai: A New Era Of Collaboration
Author: TechDogs

3. Get Business Insights Using Expedia & Booking. Com Review Data Scraping
Author: DataZivot

4. Top 10 Reasons A Strong Communication Strategy Drives Prm Program Success
Author: Archi

5. Achieve Scalable Web Scraping With Aws Lambda
Author: Devil Brown

6. Overcoming Common Challenges In Iso 27001 Implementation
Author: Jenna Miller

7. Basic Computer Course: Your Gateway To Skill Development | The Institute Of Professional Accountants
Author: Tipa Institute

8. Top 7 Advantages Of React Js
Author: Bella Stone

9. Top 7 App Marketing Tools For Mobile Success
Author: Bella Stone

10. Revolutionizing Education Management With Samphire It Solution Pvt Ltd’s Erp Software
Author: CONTENT EDITOR FOR SAMPHIRE IT SOLUTIONS PVT LTD

11. Top 10 Healthcare Technology Trends
Author: goodcoders

12. "building Tomorrow’s Factories: The Role Of Automation & Robotics In Modern Manufacturing"
Author: andrew smith

13. The Ultimate Guide To The Best Ecommerce Plugin For Wordpress
Author: Rocket Press

14. Xsosys Erp: A Scalable Solution For Businesses In Any Industry
Author: Xsosys Technology(S) Pte. Ltd.

15. Rental Management Software: A Complete Solution For Car, Property, And Coworking Space
Author: RentAAA

Login To Account
Login Email:
Password:
Sign Up Newsletter
Email Address: