Abstract

The rapid development of mobile devices and communication technologies has led to a sharp increase in the number of mobile device users. The mobile device has replaced many other devices and is used for many tasks, from making a phone call to important and confidential tasks such as cash payments. Because a mobile device accompanies a person most of the time, it is very likely that it contains that person's personal and confidential information. Wider use of mobile devices in everyday life has made mobile systems a great target for attacks. One of the most important attacks is a phishing attack, in which an attacker tries to obtain the victim's credentials and impersonate him. This paper analyzes different types of phishing attacks on mobile devices. Mitigation methods are also analyzed - methods of protection against phishing. An assessment of each method and a summary of its advantages and disadvantages are given. Finally, important steps are taken to protect against phishing attacks. The purpose of the work is to cover phishing attacks on mobile systems, inform people about these attacks and how to avoid them.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.