Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Trojan Horses

Encyclopedia of Information Science and Technology, Fifth Edition
Refers to a type of malware that seems to be a legitimate application.
Published in Chapter:
Threats and Vulnerabilities of Mobile Applications
Thangavel M. (Thiagarajar College of Engineering, India), Divyaprabha M. (Thiagarajar College of Engineering, India), and Abinaya C. (Thiagarajar College of Engineering, India)
Copyright: © 2021 |Pages: 20
DOI: 10.4018/978-1-7998-3479-3.ch034
Abstract
Smart devices like mobile phones, tablets, and laptops have become necessities in our lives due to the services they provide. However, in recent days, mobile applications have become a major threat for an attack. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. However, it also means hackers can easily distribute malware to smartphones, launching various attacks. Each day, a mobile device attack is changing dynamically, and it is very difficult to represent a complete set of threats and vulnerabilities. Mobile phone security has become an important aspect of security issues in wireless multimedia communications. The development of mobile applications has increased drastically; hence, it is our responsibility to protect our devices and the data within them. Being aware is the first step to protect data. Thus, to prevent the mobile from the threats, efforts are required to form the application developer, app market administrator, and user to defend against the malware. This article explores those threats and vulnerabilities of mobile applications.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
A Routine Activity Theory-Based Framework for Combating Cybercrime
A malware which gains privileged access to the operating system while appearing to perform a desirable function but instead drops a malicious payload.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR