Reference Hub1
Malicious Software in Mobile Devices

Malicious Software in Mobile Devices

Thomas M. Chen, Cyrus Peikari
ISBN13: 9781605660547|ISBN10: 160566054X|EISBN13: 9781605660554
DOI: 10.4018/978-1-60566-054-7.ch261
Cite Chapter Cite Chapter

MLA

Chen, Thomas M., and Cyrus Peikari. "Malicious Software in Mobile Devices." Mobile Computing: Concepts, Methodologies, Tools, and Applications, edited by David Taniar, IGI Global, 2009, pp. 3588-3598. https://doi.org/10.4018/978-1-60566-054-7.ch261

APA

Chen, T. M. & Peikari, C. (2009). Malicious Software in Mobile Devices. In D. Taniar (Ed.), Mobile Computing: Concepts, Methodologies, Tools, and Applications (pp. 3588-3598). IGI Global. https://doi.org/10.4018/978-1-60566-054-7.ch261

Chicago

Chen, Thomas M., and Cyrus Peikari. "Malicious Software in Mobile Devices." In Mobile Computing: Concepts, Methodologies, Tools, and Applications, edited by David Taniar, 3588-3598. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-60566-054-7.ch261

Export Reference

Mendeley
Favorite

Abstract

This chapter examines the scope of malicious software (malware) threats to mobile devices. The stakes for the wireless industry are high. While malware is rampant among 1 billion PCs; approximately twice as many mobile users currently enjoy a malware-free experience. However; since the appearance of the Cabir worm in 2004; malware for mobile devices has evolved relatively quickly; targeted mostly at the popular Symbian smartphone platform. Significant highlights in malware evolution are pointed out that suggest that mobile devices are attracting more sophisticated malware attacks. Fortunately; a range of host-based and network-based defenses have been developed from decades of experience with PC malware. Activities are underway to improve protection of mobile devices before the malware problem becomes catastrophic; but developers are limited by the capabilities of handheld devices.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.