Please enable JavaScript.
Coggle requires JavaScript to display documents.
Malicious Software in Mobile Computing - Coggle Diagram
Malicious Software in Mobile Computing
1.Spyware and Madware
usually finds its way onto a mobile phone through the installation of a script or program and often without the consent of the user.
collect data from your phone in order to spam you with ads.
collects information about your internet usage and sends it on to a third party.
.
Drive-by Downloads
If you open the wrong email or visit a malicious website, you could become the victim
nefarious tasks like sending viruses to other people
3.Viruses and Trojans
viruses may have a fairly innocuous payload, such as changing your phone's wallpaper or changing the language
malicious in mind like mining for passwords and banking information.
Mobile Phishing
their phishing tactics in order to scam users of mobile devices.
traditional phishing techniques involve criminals sending emails to users that appear to originate from a trusted source.
.
How to Protect Against Mobile Malware
.
.
Only download apps from official stores
better chance of installing a legitimate app through office sources.
Consider a firewall
-Firewalls not only protect your online privacy when browsing, but can be used to only allow authorized apps to access the internet through a set of firewall rules.
Use screen lock protection:
use facial recognition or fingerprint recognition technology.
Install mobile security software
protects a computer from viruses and malware
Keep applications updated
ensure that you are running the version with the latest security patches and updates
Browser Exploits
there are a number of browser exploits in the wild that can take full advantage of your browser and other applications that work within the browser, such as PDF readers