123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Mobile Phone Security Will Become A Major Threat If The Security And Privacy Of Smart Phones Are Not

Profile Picture
By Author: EC-COUNCIL
Total Articles: 68
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Recent mobile phone hacking scandal has throwned a spotlight on mobile security.It is estimated that the potential victims of the phone hacking ran to thousands, and involved government ministers, police and defense chiefs.
Charlotte Harris, who is representing several of the celebrities involved, said 7,000 people may have had their mobile phone voicemail messages intercepted by The News of the World. It is reported that the hacking took place between 2004 and 2006.
Last week, News International,which publishes the News of the World, apologized for voicemail messages left on mobile phones being hacked on behalf of the News of the World. News International said it had approached another nine people who claimed to be victims of phone hacking, asking them for more evidence. One person familiar with the situation said the nine included Steve Coogan, the comedian, Leslie Ash, the actress, and Paul Gascoigne, the former footballer, ex-member of parliament George Galloway, and actor Jude Law's personal assistant Ben Jackson.
Now the scope of the scandal has expanded. At least 24 people who claim they are victims ...
... in the phone hacking affair have initiated civil cases against News International, which is expected to pay millions of pounds in compensation.
The media conglomerate, owned by Rupert Murdoch, said in a statement that it would set up a fund to compensate those affected. That said, past behavior at the News of the World in relation to voicemail interception is a matter of genuine regret. It is now apparent that our previous inquiries failed to uncover important evidence and we acknowledge our actions then were not sufficiently robust.
News International has offered to pay compensation to eight public figures, including actress Sienna Miller and Tessa Jowell, the former Labour minister.
In a 2007 court case, Clive Goodman, the royal correspondent to the News of the World was jailed after he admitted hacking into the messages of model Elle MacPherson as well as members of the royal household. In January Andy Coulson, prime minister David Cameron's spokesman, stepped down amid speculation he had known about the hacking, despite denying that he was involved. Coulson was the editor of the News of the World newspaper in 2007 when Goodman and private investigator Glenn Mulcaire were sentenced to prison for hacking into voice mails of members of the royal family's staff.
The security and privacy of smart phones may not be very secure as the last couple of years smartphones have been under increasing attack. "The smartphone OS will become a major security target," said Android Security Leader Rich Cannings. Attackers can already hit millions of victims with a smartphone attack, and soon that number will be even larger. "Personally I think this will become an epiphany to malware authors," he said.
Cyber criminals generally steered clear of mobile devices because currently Microsoft's Windows operating system is the prime target of criminal attacks today. Security experts say that this is because mobile phones haven't traditionally stored a lot of sensitive data, and because there are so many different devices to attack, it's hard to create a single virus that can infect a large number of users.
Phone manufacturers or IT professionals working with these corporations need to do their part to keep these smart devises safe. One way to mitigate security breaches is with technical security training. Information security professionals can increase their information security knowledge and skills by embarking on highly technical and advanced training programs. EC-Council has launched the Center of a Advanced Security Training (CAST), to address the deficiency of highly technically skilled information security professionals.
CAST will provide advanced technical security training covering topics such as Advanced Penetration Testing, Digital Mobile Forensics, Advanced Application Security, Advanced Network Defense, and Cryptography. These highly technical and advanced information security training will be offered at all EC-Council hosted conferences and events, and through specially selected EC-Council Authorized Training Centers.
ABOUT EC-COUNCIL
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (CEH) course, Computer Hacking Forensics Investigator (CHFI) program, License Penetration Tester (LPT) program and various other information security training programs offered in over 60 countries around the globe. EC-Council has trained over 80,000 individuals in technical security training and certified more than 30,000 security professionals. EC-Council has launched the Center of Advanced Security Training (CAST), to address the deficiency in the lack of highly technically skilled information security professionals.

Total Views: 329Word Count: 760See All articles From Author

Add Comment

Computers Articles

1. Black Friday Tech Deals: Lock In Your 2026 Ai Readiness With Exclusive Ecf Data Offers
Author: ECF Data

2. What Is Nova And How Does It Help Businesses?
Author: TrackHr App

3. Edge Development Platform Market: Powering Next-generation Distributed Applications
Author: Umangp

4. Enterprise Mobile App DevelopmentĀ 
Author: brainbell1021

5. E-commerce Web Development
Author: brainbell1021

6. Dynamics 365 Supply Chain Management T
Author: brainbell1021

7. Modern Software At Scale: A Practical Guide To Microservice Development
Author: Tech Gazebos

8. The Financial Cost Of Ignoring Computer Repairs: A Westlake Case Study
Author: Arun Singh

9. Cloud Computing Companies In India | Cloud Hosting Service Providers In India | Sathya Technosoft
Author: Sathya Technosoft

10. Embedded Systems Advantages And Disadvantages
Author: Embeddedhash

11. Why Essae Pos Machines Are Ideal For Retail Growth
Author: pbs

12. Best Wordpress Development Companies In India For Business Growth
Author: Web Panel Solutions

13. How Enterprises Leverage It Consulting Companies In The Usa For Cybersecurity
Author: Abiel

14. Cash Drawer Security Tips For Retailers | Prime Poskart
Author: prime poskart

15. Successful Vb6 Migration And Upgrade
Author: Tech Gazebos

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: