ALL >> Computers >> View Article
The Increasing Threats Of Mobile Security In 2011

As the years have passed by, we have seen the increasing growth of the mobile phone industry and how it has shaken or affected the lives of millions of individuals in our planet. In fact, some people couldn't live a normal life without their mobile phones by their side. Other people even have multiple mobile phones just for different purposes, but whether it is for business or personal use, we will never know. But what all of us know is that there is an increase of mobile connectivity nowadays and that there are different mobile phones with access to the internet, which has opened up new avenues to conduct any transactions or use any applications found on the Internet.
Unfortunately, the growth in the mobile phone industry as well the increase of the number how the phones can be used have resulted into an unforeseen problem to many individuals as well as to different industries. This problem is what experts call the threat of malware and other cyber threats on mobile security networks.
According to many security experts, security researchers and any master in information security ...
... /strong>, the threats in mobile security will double in each year; thus we can say that the security attempts, exploits or breaches on mobile phones this year is comparably more than last year. In fact, it has been predicted already, but few paid attention to it and mobile manufacturing companies just continued with their manufacturing processes never thinking about the security features of the phone.
In each year, the global consumerism of the mobile industry has epitomized the importance of bringing your very own mobile device where ever a person may go. As a matter of fact, this idea is common among different companies and institutions because mobile phones with high-connectivity to the Internet as well as the system of the company have raised many security concerns. These mobile devices are very open to different cyber threats like malware because of their security vulnerabilities. Sometimes these devices are excellent avenues in compromising the system and networks of many industries.
The first half of this year alone, there has been a significant increase on the number of mobile devices particularly Android phones and Smart phones that are infected with malicious software and codes. Years ago, ms in information security experts and security researchers were wondering when the malware threat will become a real problem in the newest generation of mobile phones and hand-held devices. Somehow, it appears that the time has come.
A typical mobile phone with internet connectivity or perhaps Smart or Android devices can be infected by mobile malware if the user downloads or purchases certain applications from third-party stores. Sometimes these applications are even found on different peer-to-peer networks. It could even be hosted on certain websites as well as on Usenet. These applications are targeted to individuals who are looking for cracked or pirated versions of the legit applications. What makes this mobile malware more dangerous is that it can be transferred from one phone to another or from the phone to the company's system because of these phones connectivity.
Although there has been an increase of mobile threats, researchers and masters degree in information security experts have found that in the first half of the year 2011, there has been a decrease of vulnerabilities on different applications found on the Web. From 2010's 49 percent, it is now all down to just 37 percent. In fact, for the past five years, this has been the only decrease of vulnerabilities of Web applications ever recorded. Furthermore, since the year 2007, all the crucial and high vulnerabilities in browsers are at the lowest point ever.
Researchers have tested hundred of websites, from Fortune 500 sites to other popular sites as well. They have discovered that almost 40 percent of these websites have client-side vulnerabilities on their JavaScript. And unfortunately, there has been a significant increase of spear phishing on large industries, organizations and institutions – or simply called whaling.
The number of threats in the security of networks in various companies and industries challenges each and every company or industry. Although these threats are real, companies know different ways to deter any cyber plots against them. But the increasing threats coming from mobile malware is a different story.
EC-Council University is a licensed university that offers degrees and master's degrees on Security Science online. The degrees are recognized worldwide and may be used in any employment worldwide as well as the graduate certificates that they offer. With excellence and dedication as the core values, many professionals and degree holders have benefitted from undergoing the programs in this university.
More information about master's degrees in information security available at www.eccuni.us.
Add Comment
Computers Articles
1. Scraping Dan Murphys Liquor Products Details DataAuthor: FoodDataScrape
2. Blue Wizard Liquid Drops 30 Ml 2 Bottles Price In Lahore
Author: bluewizard.pk
3. How Does Blockchain Resolve Data Privacy And Security Issues For Businesses?
Author: Severus Snape
4. Scrape Quick-commerce Data From Deliveroo Hop Uae
Author: FoodDataScrape
5. Web Scraping Quick-commerce Data From Noon Minutes Uae
Author: FoodDataScrape
6. Helical Insight: Best Open Source Data Visualization Tool In 2025
Author: Vhelical
7. Scrape Top Selling Grocery Product Data From Walmart Usa
Author: FoodDataScrape
8. Extract Quick Commerce Data From Flipkart Minutes
Author: FoodDataScrape
9. Refurbished Laptop Scams And How To Safely Buy A Trusted Device
Author: Sujtha
10. Web Scraping Freshco Supermarket Product Data In Canada
Author: FoodDataScrape
11. How To Compare Two Lists In Excel​: A Definitive Guide For Data Professionals
Author: blackjack
12. Monthly Updated Uber Eats Menu Dataset For 500k+ Restaurants
Author: FoodDataScrape
13. Extract Mcdonalds Store Locations Data In Usa For Competitiveness
Author: FoodDataScrape
14. Scrape Spicy Food Trend Data In Usa 2025 For Competitive Advantage
Author: FoodDataScrape
15. Why Startups Should Invest In Custom Software Development Service
Author: Albert