Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available
(no registration required)

(227.97KB)


-- CSC-OpenAccess Policy
-- Creative Commons Attribution NonCommercial 4.0 International License
>> COMPLETE LIST OF JOURNALS

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria
Vulnerabilities in Mobile Devices
Sulaiman Al amro
Pages - 34 - 41     |    Revised - 30-04-2017     |    Published - 01-06-2017
Published in International Journal of Computer Science and Security (IJCSS)
Volume - 11   Issue - 3    |    Publication Date - June 2017  Table of Contents
MORE INFORMATION
References   |   Abstracting & Indexing
KEYWORDS
Mobile Devices, Vulnerabilities, Encryption, Operating Systems, Applications.
ABSTRACT
Mobile devices are no longer just dedicated communication devices and have even exceeded the limits of such, and have become an essential part of our life; they are indispensable. It is through the memory that you can store images and videos and can also connect to social networking; it can also be played by linking to bank accounts. However, we must bear in mind that there are people in this world who are trying, day and night, to get to your private information, to steal from you and either exploit the user or simply to steal his/her money. These people are called hackers, as will be named through our topic for today. We will put in your hands the most important points that make sure that he is spying on your mobile and the mobile penetrative. The biggest obstacle to these investigators, whether spies or hackers' encryption is "full device encryption" or "full data" to be encrypted, and here we must distinguish between the two things, not confusing them. This paper will explain the vulnerabilities of mobile devices and how they can be avoided.
ABSTRACTING & INDEXING
1 Google Scholar 
2 BibSonomy 
3 Scribd 
4 SlideShare 
REFERENCES
Doherty, J., (2014). Wireless and mobile device security. Jones & Bartlett .
Duckett, C., (2015). DES encryption leaves SIM cards vulnerable to exploitation. Retrieved Nov., 12, 2016, from http://www.zdnet.com/article/des-encryption-leaves-sim-cards-vulnerable-to-exploitation/
Goggin, G., (2012). Cell phone culture: Mobile technology in everyday life. Routledge.
NowSecure, (2015). Samsung keyboard security risk disclosed: Over 600M+ devices worldwide impacted. Retrieved Dec. 13, 2016, from https://www.nowsecure.com/blog/2015/06/16/samsung-keyboard-security-risk-disclosed-600m-devices-worldwide-impacted/.
Oteri, O.M., Kibet, L.P. and Ndung'u Edward, N., (2015). Mobile subscription, penetration and coverage trends in Kenya's telecommunication sector. (IJARAI) International Journal of Advanced Research in Artificial Intelligence.
Solnik, M. and Blanchou, M., (2014). Cellular exploitation on a global scale: The rise and fall of the control protocol. Black Hat USA. Vancouver.
Stanley, M., (2009). The mobile internet report. Morgan Stanley research. Retrieved Dec. 13, 2015, from http://www.morganstanley.com/institutional/techresearch/pdfs/mobile_internet_report.pdf.
Vilaca, P., (2015). A loophole in "Apple" Mac computers and iOS system. Retrieved Mar. 22, 2016, from https://sentinelone.com/events/sentinelone-apple-security-expert-to-present-at- syscan360/
Westlake, A., (2016). Qualcomm-powered Android devices found to have faulty full disk encryption. Retrieved Feb 28, 2017 from https://www.slashgear.com/qualcomm-powered-android-devices-found-to-have-faulty-full-disk-encryption-02446903/ .
Zimperium Team, (2015). Experts found a unicorn in the heart of android. Retrieved Oct. 6, 2016, from https://blog.zimperium.com/experts-found-a-unicorn-in-the-heart-of-android/ .
MANUSCRIPT AUTHORS
Dr. Sulaiman Al amro
Qassim University - Saudi Arabia
sulaimanamro@gmail.com


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS
 
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions