Abstract

In recent years, more and more users and businesses use smart phone as communication tools, but also use in our private life. In the meantime, hackers use the network exploits to attack users' smart phone. These attacks exploit weaknesses come from different kinds of access just like SMS, Wi-Fi networks and MMS. Here, we will show eight modules, which cover important mobile threats in most aspects of mobile security. Each module focuses on one type of mobile threats, such as Spyware, SMS Spam and Malware, and we will convey the threat analysis and protection in multiple ways. We will provide one lab in each module to explain the solutions that we get. Index Terms - Mobile Security, Smart Phone

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.