Inderscience Publishers

Exploration of attack vectors facilitated by mobile devices

- By: , ,

Courtesy of Courtesy of Inderscience Publishers

Mobile devices like smartphones and tablets have become an important part of most people’s everyday life. As the number of mobile applications (apps) has grown rapidly, there are various apps written with malicious intent raging from passive data gathering to active interference with other people’s connection to steal credentials, etc. All these apps could allow attackers to use mobile devices as attacking tools for hacking purpose and cyber criminality. In this paper, we present a broad exploration of possible attack vectors that could be launched through mobile devices. We also offer some advice for countering these attacks.

Keywords: mobile device, attack vector, countermeasure, security

Customer comments

No comments were found for Exploration of attack vectors facilitated by mobile devices. Be the first to comment!