Reference Hub1
Review on Security Threats for Mobile Devices and Significant Countermeasures on Securing Android Mobiles

Review on Security Threats for Mobile Devices and Significant Countermeasures on Securing Android Mobiles

Lediona Nishani
Copyright: © 2016 |Pages: 18
ISBN13: 9781466688414|ISBN10: 1466688416|EISBN13: 9781466688421
DOI: 10.4018/978-1-4666-8841-4.ch001
Cite Chapter Cite Chapter

MLA

Nishani, Lediona. "Review on Security Threats for Mobile Devices and Significant Countermeasures on Securing Android Mobiles." Automated Enterprise Systems for Maximizing Business Performance, edited by Petraq Papajorgji, et al., IGI Global, 2016, pp. 1-18. https://doi.org/10.4018/978-1-4666-8841-4.ch001

APA

Nishani, L. (2016). Review on Security Threats for Mobile Devices and Significant Countermeasures on Securing Android Mobiles. In P. Papajorgji, F. Pinet, A. Guimarães, & J. Papathanasiou (Eds.), Automated Enterprise Systems for Maximizing Business Performance (pp. 1-18). IGI Global. https://doi.org/10.4018/978-1-4666-8841-4.ch001

Chicago

Nishani, Lediona. "Review on Security Threats for Mobile Devices and Significant Countermeasures on Securing Android Mobiles." In Automated Enterprise Systems for Maximizing Business Performance, edited by Petraq Papajorgji, et al., 1-18. Hershey, PA: IGI Global, 2016. https://doi.org/10.4018/978-1-4666-8841-4.ch001

Export Reference

Mendeley
Favorite

Abstract

Security nowadays is not a “nice to have,” but a must-have. Cybercriminals have started a new way of encouraging their activities by selling their services on the deep dark web. They are becoming day by day more persistent and smarter than ever. Therefore, the companies have to be smarter in order to face the diversity of new threats every day. The increase of botnets is responsible for an emerging ransomware attacks through cryptolocker. Another modern malware are APT (Advanced persistent threats, sophisticated threats that undertake missions in cyber space). This chapter is about a summary of the most prominent attacks on security threats regarding android mobile devices. In this review chapter we will disclose and analyze chronicles of attack, which cover researching period from 2004 when was discovered the first mobile malware, until 2014. Our research will narrow down just in the two last years because of tremendous surge of android malware that has emerged just in this short period. We have chosen this small research sample in order to provide insights and give significant evidence that in a short period we have to investigate and analyze so many miscellaneous malware and vulnerabilities techniques. In subsequent proceedings, this chapter points out the main threats category we have thought to be more notable or significant to be investigated in this review chapter. Later on, it discusses future trends and some strong recommendation on facing and dealing with the internet technology based area.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.