An unwanted software that has the ability of stealing the sensitive data, without your knowledge.
Published in Chapter:
Threats and Vulnerabilities of Mobile Applications
Thangavel M. (Thiagarajar College of Engineering, India), Divyaprabha M. (Thiagarajar College of Engineering, India), and Abinaya C. (Thiagarajar College of Engineering, India)
Copyright: © 2021
|Pages: 20
DOI: 10.4018/978-1-7998-3479-3.ch034
Abstract
Smart devices like mobile phones, tablets, and laptops have become necessities in our lives due to the services they provide. However, in recent days, mobile applications have become a major threat for an attack. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. However, it also means hackers can easily distribute malware to smartphones, launching various attacks. Each day, a mobile device attack is changing dynamically, and it is very difficult to represent a complete set of threats and vulnerabilities. Mobile phone security has become an important aspect of security issues in wireless multimedia communications. The development of mobile applications has increased drastically; hence, it is our responsibility to protect our devices and the data within them. Being aware is the first step to protect data. Thus, to prevent the mobile from the threats, efforts are required to form the application developer, app market administrator, and user to defend against the malware. This article explores those threats and vulnerabilities of mobile applications.