Wednesday, June 9, 2010

Mobile phone attacks

There are both simple and sophisticated way is to protect cell phones from attacking the United States from phones with Bluetooth connections and functions of the data, the main objectives of malware is usually that the phone must be protected from security vulnerabilities. Mobile threats are mainly in three ways, Internet downloads, Bluetooth wireless connections to spread, and Multimedia Messaging Service (MMS).

many safeguards are in devices such as the user set a built-instrong, the five-digit PIN code for Bluetooth devices so that access to crack more difficult, and most phones have digital encryption capabilities, to reduce the possibility of shooting someone in a conversation. Mobile anti-virus software is always available, which is used for different units of platforms.

Mobile phone use varies around the world. In Japan, mobile phones for financial transactions like a credit card. Other uses include live TV, games, photosAppreciation and GPS navigation. On average, Japan is about five years before the United States in terms of mobile phone technology.

With the increased use of mobile phones in Japan have advanced security features as well. NTT DoCoMo P903i for example, includes security features such as Face Detection and password protection for financial transactions. further protection is the owner of a mobile phone chip security door into a pocket or purse, and at any time of the cellPhone is out of reach, stops and prevents their use. These methods, as well as safeguards for the United States has said, can ensure greater security, but the risk of Internet usage and the data is broken during transmission remains high. Further protection of service providers and mobile phone manufacturers need to continuously improve, because the wireless technology and threats against them, is here to stay.

Mobile phone viruses spread downloaded from the Internet the same waya computer virus. Infected files are downloaded through wireless Internet phone, or downloaded to a computer and then synchronized or transferred to the phone. To protect the cells from this type of use you should check the authenticity of the download, to ensure that reliable sources. In addition, mobile users synchronize files and antivirus software are considering selective synchronization frequently offers the opportunity for maximum transferinfected files.

Threat of Bluetooth wireless connection occur when a user receives a virus via Bluetooth, while the phone should be in the mode of detection, so the user and disable Bluetooth discoverable mode until needed. To a virus via an MMS message to be included as an attachment to spread. To stop a virus like this more, you should not open unexpected attachments.

Users should make their software in line with regular news alertCheck for new versions of operating system and applications. In addition, they must be careful in the direction of suspicious attachments, downloads and exercise.

Multiple layers of defense to create the most effective protection. The first layer must ensure that the infrastructure of mobile telephony, including trees and mobile telecommunications switching office. The second level of protection lies with mobile phone manufacturers and software developers. The third level of protection is toresponsibility of the end user.

A simple step, end users, their use is monitored battery, because it is a telltale sign of active malware batteries quickly. In addition, users should disable their keyboard when not in use to prevent unauthorized access and change passwords frequently.

No comments:

Post a Comment