Abstract

In the ever developing world of technology, mobile applications are increasing day by day alongside with mobile cyber threats. This fact is valid as a result of shifts from e-government to m-government and classical e-business to m-business solutions. Therefore the electronic structure of government services can be accessed from mobile apps using mobile signatures. The main threat is personal data that can be captured by malicious codes and hence dangerous results can be faced. In this paper, malicious software and security techniques of the mobile applications are analyzed in addition to protection systems from user, developer aspects and even Google Play. The main issue of this paper is providing sets of counter controls for covering vulnerabilities of mobile applications.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call