123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Mobile Phone Security Will Become A Major Threat If The Security And Privacy Of Smart Phones Are Not

Profile Picture
By Author: EC-COUNCIL
Total Articles: 68
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Recent mobile phone hacking scandal has throwned a spotlight on mobile security.It is estimated that the potential victims of the phone hacking ran to thousands, and involved government ministers, police and defense chiefs.
Charlotte Harris, who is representing several of the celebrities involved, said 7,000 people may have had their mobile phone voicemail messages intercepted by The News of the World. It is reported that the hacking took place between 2004 and 2006.
Last week, News International,which publishes the News of the World, apologized for voicemail messages left on mobile phones being hacked on behalf of the News of the World. News International said it had approached another nine people who claimed to be victims of phone hacking, asking them for more evidence. One person familiar with the situation said the nine included Steve Coogan, the comedian, Leslie Ash, the actress, and Paul Gascoigne, the former footballer, ex-member of parliament George Galloway, and actor Jude Law's personal assistant Ben Jackson.
Now the scope of the scandal has expanded. At least 24 people who claim they are victims ...
... in the phone hacking affair have initiated civil cases against News International, which is expected to pay millions of pounds in compensation.
The media conglomerate, owned by Rupert Murdoch, said in a statement that it would set up a fund to compensate those affected. That said, past behavior at the News of the World in relation to voicemail interception is a matter of genuine regret. It is now apparent that our previous inquiries failed to uncover important evidence and we acknowledge our actions then were not sufficiently robust.
News International has offered to pay compensation to eight public figures, including actress Sienna Miller and Tessa Jowell, the former Labour minister.
In a 2007 court case, Clive Goodman, the royal correspondent to the News of the World was jailed after he admitted hacking into the messages of model Elle MacPherson as well as members of the royal household. In January Andy Coulson, prime minister David Cameron's spokesman, stepped down amid speculation he had known about the hacking, despite denying that he was involved. Coulson was the editor of the News of the World newspaper in 2007 when Goodman and private investigator Glenn Mulcaire were sentenced to prison for hacking into voice mails of members of the royal family's staff.
The security and privacy of smart phones may not be very secure as the last couple of years smartphones have been under increasing attack. "The smartphone OS will become a major security target," said Android Security Leader Rich Cannings. Attackers can already hit millions of victims with a smartphone attack, and soon that number will be even larger. "Personally I think this will become an epiphany to malware authors," he said.
Cyber criminals generally steered clear of mobile devices because currently Microsoft's Windows operating system is the prime target of criminal attacks today. Security experts say that this is because mobile phones haven't traditionally stored a lot of sensitive data, and because there are so many different devices to attack, it's hard to create a single virus that can infect a large number of users.
Phone manufacturers or IT professionals working with these corporations need to do their part to keep these smart devises safe. One way to mitigate security breaches is with technical security training. Information security professionals can increase their information security knowledge and skills by embarking on highly technical and advanced training programs. EC-Council has launched the Center of a Advanced Security Training (CAST), to address the deficiency of highly technically skilled information security professionals.
CAST will provide advanced technical security training covering topics such as Advanced Penetration Testing, Digital Mobile Forensics, Advanced Application Security, Advanced Network Defense, and Cryptography. These highly technical and advanced information security training will be offered at all EC-Council hosted conferences and events, and through specially selected EC-Council Authorized Training Centers.
ABOUT EC-COUNCIL
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (CEH) course, Computer Hacking Forensics Investigator (CHFI) program, License Penetration Tester (LPT) program and various other information security training programs offered in over 60 countries around the globe. EC-Council has trained over 80,000 individuals in technical security training and certified more than 30,000 security professionals. EC-Council has launched the Center of Advanced Security Training (CAST), to address the deficiency in the lack of highly technically skilled information security professionals.

Total Views: 328Word Count: 760See All articles From Author

Add Comment

Computers Articles

1. Modern Software At Scale: A Practical Guide To Microservice Development
Author: Tech Gazebos

2. The Financial Cost Of Ignoring Computer Repairs: A Westlake Case Study
Author: Arun Singh

3. Cloud Computing Companies In India | Cloud Hosting Service Providers In India | Sathya Technosoft
Author: Sathya Technosoft

4. Embedded Systems Advantages And Disadvantages
Author: Embeddedhash

5. Why Essae Pos Machines Are Ideal For Retail Growth
Author: pbs

6. Best Wordpress Development Companies In India For Business Growth
Author: Web Panel Solutions

7. How Enterprises Leverage It Consulting Companies In The Usa For Cybersecurity
Author: Abiel

8. Cash Drawer Security Tips For Retailers | Prime Poskart
Author: prime poskart

9. Successful Vb6 Migration And Upgrade
Author: Tech Gazebos

10. Soluzioni Complete Per La Stampa In Ufficio: Assistenza, Noleggio E Manutenzione Professionale
Author: Mihai Filip

11. Cheap Vps Hosting & Dedicated Server Solutions – Fast, Secure & Affordable | Rackoona
Author: Rackoona

12. Reliable Temperature Monitoring Solutions Enhancing Drug Safety And Freezer Storage Compliance By Tempgenius
Author: Chris Miller

13. Spark Matrix™: Evaluating Security Information And Event Management (siem) Solutions For Scalable And Intelligent Security Operations
Author: Umangp

14. How To Get In Touch With Bellsouth Customer Service By phone?
Author: frank rayan

15. Bca In Cyber Security Online: Curriculum, Labs, And 2025 Modules
Author: UniversityGuru

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: