SlideShare a Scribd company logo
1 of 13
02/22/17 Prepared By:ANSHU VASHISTH 1
Trends in Mobility:
Mobile computing era- 3G, 4G, VoLTE
I phone from Apple
Google - Android
02/22/17 Prepared By:ANSHU VASHISTH 2
02/22/17 Prepared By:ANSHU VASHISTH 3
Attack Against 3G mobile network:
1. Malware, virus and worms-
Skull Trojan- target series 60 phones equipped with Symbian mobile OS.
Cabir Worm- First worm for phone and scan mobile device to send copy of data.
Brador Tojan- affects Window OS by creating svchost.exe file in the window start-up
folder which allow full control of device.
2. DoS:
02/22/17 Prepared By:ANSHU VASHISTH 4
3. Overbilling Attack:
Hijacking subscriber IP address to download paid things for Which legitimate user
charged.
4. Spoofed Policy Development Process:
Exploit vulnerabilities in GPRS
5. Signaling- level attacks:
Attack on system which use VoIP
02/22/17 Prepared By:ANSHU VASHISTH 5
Attacks on Mobile/Cell Phones:
1. Mobile Phone Theft:
Reason of Attack on Mobile Device:
Frequent use by person
Enough functionality
Enough Connectivity
02/22/17 Prepared By:ANSHU VASHISTH 6
2. Mobile Viruses:
40 Virus family with 300+ mobile virus
XALAN is a virus which erase yours IMEI and IMSI no due to which new
phone will be disconnected from network.
Motorola and Nokia confirmed this attack and infected 3 Million mobile
phone in the world
02/22/17 Prepared By:ANSHU VASHISTH 7
3. Mishing:
Combination of mobile phone and phishing.
Use of mobile phones for online action like shopping and transaction can
be more vulnerable to Mishing.
When attacker use call termed as Vishing.
When use SMS termed as Smishing.
02/22/17 Prepared By:ANSHU VASHISTH 8
4. Vishing:
Most common information gained through Vishing:
ID theft
Purchasing luxury good s and service
Transferring money/funds
Monitoring the victims bank account
Making applications for loans and credit cards (Steel credit card number)
02/22/17 Prepared By:ANSHU VASHISTH 9
How Vishing works?
Through e-mail, Voicemail, Direct phone call.
How to protect from Vishing Attacks?
Report Incident, Do not give your personal information
02/22/17 Prepared By:ANSHU VASHISTH 10
5. Smishing:
Combination of SMS and phishing.
Send message to victim and ask to click on link that is actually fake and PI will be
sent to attacker.
How Smishing works?
02/22/17 Prepared By:ANSHU VASHISTH 11
How to Protect from Smishing Attacks:
Do not answer the text message.
Never click on link given in message.
Never call those number which are mentioned in Message
02/22/17 Prepared By:ANSHU VASHISTH 12
6. Hacking Bluetooth:
Bluetooth is an open wireless technology.
Tools which are installed on laptop and can scan nearby device.
Can get your photos, contacts and SIM card details.
Works on 2.4GHz frequency with 3Mbps speed (BLUETOOTH 2.0).
Common used tools are BlueBugger, BlueDiving etc.
02/22/17 Prepared By:ANSHU VASHISTH 13
Attacks on Bluetooth Security:
1. Bluejacking- means Bluetooth + jacking: Sending messages like visiting
card with Bluetooth enabled device
2. Bluesnaring: Unauthorized access through Bluetooth to gain the access of e-
mails, calendar, SMS etc.
3. Bluebugging: allow attacker to remotely login to nearby Bluetooth device
without user attention.
4. Car Whisperer: Piece of software allow attacker to send audio and receive
audio from Bluetooth enabled device and could do any serious task link disabling
airbags or break etc.
Research is going on that can attacker can access Phone book through this
attack.

More Related Content

What's hot

What’s in your computer
What’s in your computerWhat’s in your computer
What’s in your computer
lmadison10
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
Vdidv
 
yoda at rotary_pune_club
yoda at rotary_pune_clubyoda at rotary_pune_club
yoda at rotary_pune_club
Antz911
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
Nithilan1
 

What's hot (19)

mSpy Review - Android Keylogger
mSpy Review - Android KeyloggermSpy Review - Android Keylogger
mSpy Review - Android Keylogger
 
Cyber warfare
Cyber warfareCyber warfare
Cyber warfare
 
What’s in your computer
What’s in your computerWhat’s in your computer
What’s in your computer
 
Global Botnet Detector
Global Botnet DetectorGlobal Botnet Detector
Global Botnet Detector
 
UNDERSTANDING HACKING
UNDERSTANDING HACKINGUNDERSTANDING HACKING
UNDERSTANDING HACKING
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
 
Internet Security IT
Internet Security ITInternet Security IT
Internet Security IT
 
What is wanna cry ransomware attack
What is wanna cry ransomware attackWhat is wanna cry ransomware attack
What is wanna cry ransomware attack
 
2 2 the dangers of computer crime
2 2 the dangers of computer crime2 2 the dangers of computer crime
2 2 the dangers of computer crime
 
Newsbyte
NewsbyteNewsbyte
Newsbyte
 
What is Malware?
What is Malware? What is Malware?
What is Malware?
 
Botnets
BotnetsBotnets
Botnets
 
yoda at rotary_pune_club
yoda at rotary_pune_clubyoda at rotary_pune_club
yoda at rotary_pune_club
 
Cyber security
Cyber securityCyber security
Cyber security
 
Wannacry-A Ransomware Attack
Wannacry-A Ransomware AttackWannacry-A Ransomware Attack
Wannacry-A Ransomware Attack
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Nanu
NanuNanu
Nanu
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
 
Underground malware economy
Underground malware economyUnderground malware economy
Underground malware economy
 

Viewers also liked

Viewers also liked (20)

Discriminacion de la homosexualidad en Mexico 2016
Discriminacion de la homosexualidad en Mexico 2016Discriminacion de la homosexualidad en Mexico 2016
Discriminacion de la homosexualidad en Mexico 2016
 
7 Awesomely Techie Jobs
7 Awesomely Techie Jobs7 Awesomely Techie Jobs
7 Awesomely Techie Jobs
 
Trabajo segundo a
Trabajo segundo aTrabajo segundo a
Trabajo segundo a
 
Sanchez y chicaiza
Sanchez y chicaizaSanchez y chicaiza
Sanchez y chicaiza
 
Correo Electronico.
Correo Electronico.Correo Electronico.
Correo Electronico.
 
Diapositivas pptxaborto-091108182713-phpapp02
Diapositivas pptxaborto-091108182713-phpapp02Diapositivas pptxaborto-091108182713-phpapp02
Diapositivas pptxaborto-091108182713-phpapp02
 
Indirect speech
Indirect speechIndirect speech
Indirect speech
 
Pobreza en méxico
Pobreza en méxicoPobreza en méxico
Pobreza en méxico
 
Lindsey-Thomas
Lindsey-ThomasLindsey-Thomas
Lindsey-Thomas
 
Exposición2
Exposición2Exposición2
Exposición2
 
How to become a successful actor
How to become a successful actorHow to become a successful actor
How to become a successful actor
 
Which and when
Which and whenWhich and when
Which and when
 
Instant cash money transfer in ndia
Instant cash money transfer in ndiaInstant cash money transfer in ndia
Instant cash money transfer in ndia
 
Correo Electronico.
Correo Electronico.Correo Electronico.
Correo Electronico.
 
So that
So thatSo that
So that
 
Manual de orden_cerrado15
Manual de orden_cerrado15Manual de orden_cerrado15
Manual de orden_cerrado15
 
La Naturaleza.
La Naturaleza.La Naturaleza.
La Naturaleza.
 
If
IfIf
If
 
Rodrigo loramúsica(2)
Rodrigo loramúsica(2)Rodrigo loramúsica(2)
Rodrigo loramúsica(2)
 
Although though eventhough
Although  though eventhoughAlthough  though eventhough
Although though eventhough
 

Similar to Int509 lec 7-8

Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone Security
Guneet Pahwa
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
Zarafa
 
Security issues vs user awareness in mobile devices a survey
Security issues vs user awareness in mobile devices  a surveySecurity issues vs user awareness in mobile devices  a survey
Security issues vs user awareness in mobile devices a survey
IAEME Publication
 

Similar to Int509 lec 7-8 (20)

Cp3201 mobile security final
Cp3201 mobile security finalCp3201 mobile security final
Cp3201 mobile security final
 
Report of android hacking
Report of android hackingReport of android hacking
Report of android hacking
 
P01761113118
P01761113118P01761113118
P01761113118
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone Security
 
“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”
 
Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile network
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
Security issues vs user awareness in mobile devices a survey
Security issues vs user awareness in mobile devices  a surveySecurity issues vs user awareness in mobile devices  a survey
Security issues vs user awareness in mobile devices a survey
 
HinDroid
HinDroidHinDroid
HinDroid
 
L017326972
L017326972L017326972
L017326972
 
Face expressions, facial features, kinect sensor, face tracking SDK, neural n...
Face expressions, facial features, kinect sensor, face tracking SDK, neural n...Face expressions, facial features, kinect sensor, face tracking SDK, neural n...
Face expressions, facial features, kinect sensor, face tracking SDK, neural n...
 
Hacking 04 2011
Hacking 04 2011Hacking 04 2011
Hacking 04 2011
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
Him
HimHim
Him
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
 
The Current State of Cybercrime 2014
The Current State of Cybercrime 2014The Current State of Cybercrime 2014
The Current State of Cybercrime 2014
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 

Recently uploaded

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 

Int509 lec 7-8

  • 1. 02/22/17 Prepared By:ANSHU VASHISTH 1 Trends in Mobility: Mobile computing era- 3G, 4G, VoLTE I phone from Apple Google - Android
  • 3. 02/22/17 Prepared By:ANSHU VASHISTH 3 Attack Against 3G mobile network: 1. Malware, virus and worms- Skull Trojan- target series 60 phones equipped with Symbian mobile OS. Cabir Worm- First worm for phone and scan mobile device to send copy of data. Brador Tojan- affects Window OS by creating svchost.exe file in the window start-up folder which allow full control of device. 2. DoS:
  • 4. 02/22/17 Prepared By:ANSHU VASHISTH 4 3. Overbilling Attack: Hijacking subscriber IP address to download paid things for Which legitimate user charged. 4. Spoofed Policy Development Process: Exploit vulnerabilities in GPRS 5. Signaling- level attacks: Attack on system which use VoIP
  • 5. 02/22/17 Prepared By:ANSHU VASHISTH 5 Attacks on Mobile/Cell Phones: 1. Mobile Phone Theft: Reason of Attack on Mobile Device: Frequent use by person Enough functionality Enough Connectivity
  • 6. 02/22/17 Prepared By:ANSHU VASHISTH 6 2. Mobile Viruses: 40 Virus family with 300+ mobile virus XALAN is a virus which erase yours IMEI and IMSI no due to which new phone will be disconnected from network. Motorola and Nokia confirmed this attack and infected 3 Million mobile phone in the world
  • 7. 02/22/17 Prepared By:ANSHU VASHISTH 7 3. Mishing: Combination of mobile phone and phishing. Use of mobile phones for online action like shopping and transaction can be more vulnerable to Mishing. When attacker use call termed as Vishing. When use SMS termed as Smishing.
  • 8. 02/22/17 Prepared By:ANSHU VASHISTH 8 4. Vishing: Most common information gained through Vishing: ID theft Purchasing luxury good s and service Transferring money/funds Monitoring the victims bank account Making applications for loans and credit cards (Steel credit card number)
  • 9. 02/22/17 Prepared By:ANSHU VASHISTH 9 How Vishing works? Through e-mail, Voicemail, Direct phone call. How to protect from Vishing Attacks? Report Incident, Do not give your personal information
  • 10. 02/22/17 Prepared By:ANSHU VASHISTH 10 5. Smishing: Combination of SMS and phishing. Send message to victim and ask to click on link that is actually fake and PI will be sent to attacker. How Smishing works?
  • 11. 02/22/17 Prepared By:ANSHU VASHISTH 11 How to Protect from Smishing Attacks: Do not answer the text message. Never click on link given in message. Never call those number which are mentioned in Message
  • 12. 02/22/17 Prepared By:ANSHU VASHISTH 12 6. Hacking Bluetooth: Bluetooth is an open wireless technology. Tools which are installed on laptop and can scan nearby device. Can get your photos, contacts and SIM card details. Works on 2.4GHz frequency with 3Mbps speed (BLUETOOTH 2.0). Common used tools are BlueBugger, BlueDiving etc.
  • 13. 02/22/17 Prepared By:ANSHU VASHISTH 13 Attacks on Bluetooth Security: 1. Bluejacking- means Bluetooth + jacking: Sending messages like visiting card with Bluetooth enabled device 2. Bluesnaring: Unauthorized access through Bluetooth to gain the access of e- mails, calendar, SMS etc. 3. Bluebugging: allow attacker to remotely login to nearby Bluetooth device without user attention. 4. Car Whisperer: Piece of software allow attacker to send audio and receive audio from Bluetooth enabled device and could do any serious task link disabling airbags or break etc. Research is going on that can attacker can access Phone book through this attack.