Please enable JavaScript.
Coggle requires JavaScript to display documents.
VULNERABILITIES ,THREATS & ATTACKS SCENARIO OF MOBILE APPLICATION…
VULNERABILITIES ,THREATS & ATTACKS SCENARIO OF MOBILE APPLICATION
Attack Vector
-
. Rogue developers repackage legitimate apps with malware.
embedded malware can initiate activities to send out premium SMSes, uninstall antivirus solutions and access sensitive content.
3.Drive-by downloads:
, where accessing infected sites results in malicious apps being installed without user knowledge.
-
-
6.App vulnerabilities:
Insecure coding can lead to apps acting as a conduit through which malware and attackers gain control of your device.
-
Threats Scenario
Mobile pick-pocketing:
Malware and apps indulge in petty financial fraud such as the generation of premium SMSs and premium phone-calls without user intervention or approval.
Stealing of personal information:
Theft of information like contacts, SMSs and media files is widespread, especially on open platforms.
Spyware:
Smartphones have features like cameras, microphones and GPS tracking. Several apps allow these features to be activated remotely without the user’s knowledge.
Identity theft:
This involves spoofing a phone’s parameters and details.
Mobile botnets / relays:
Smartphones with powerful 2G/3G/4G connections can be used as nodes and relays in a botnet.