SlideShare a Scribd company logo
1 of 21
THREATS TO
MOBILE NETWORK
SECURITY
by
Gadde. RAVITEJA
14304007
CONTENTS:
 Introduction
 Threads
 Types of threads
 Protecting your phone
 conclusion
Introduction:
Can virus infect the mobile phones?
 The answer is YES.
The first known cell-phone virus appeared in 2004 is
cabir.
 The chance is increasing day by day and recent hoax virus,
Spam SMS worms is an evidence of it. Due to the financial
aspects associated with wireless communications, this subject is
under through research now.
Cell-phone Virus Basics:
 A cell-phone virus is basically the same thing as a computer virus .an
unwanted executable file that "infects" a device and then copies itself to other
devices. But whereas a computer virus or worm spreads through e-
mail attachments and Internet downloads, a cell-phone virus or worm spreads
via Internet downloads, MMS attachments and Bluetooth transfers.
 The most common type of cell-phone infection right now occurs when a cell
phone downloads an infected file from a PC or the Internet ,or phone to phone.
Threats:
 A mobile phone user especially smartphone user is exposed to various threats
when they use their phone. In the last two quarters of 2012, the number of
unique mobile threats grew by 26.1%, according to ABI (Allied Business
Intelligence Research).These threats can disrupt the operation of the
smartphone, and transmit or modify user data
 Problems to mobiles Dew to these threads
 Data : data management, therefore they may contain sensitive data
like credit card numbers, authentication information, private information,
activity logs.
 Identity : To steal the identity of the owner of a smartphone to commit
other.
 Availability
Different types of threats or attacks on
mobile security
 Attack based on communication (SMS and MMS)
 Attacks based on communication networks
 Attacks based on vulnerabilities in software applications
 Password cracking
 Malicious software (malware)
Attack based on communication (SMS and MMS)
 Infected text messages sometimes steal the subject line from a message
you have received from a friend(chinese characters), which of course
increases the likelihood of your opening it.
 A virus that spreads via MMS gets into the phone's contact list and sends
itself to every phone number stored there.
 In all of these transfer methods, the user has to agree at least once (and
usually twice) to run the infected file.
 Attacks based on the GSM networks:
These are form dew to the miss matching of encryption algorithms. The
attacker may try to break the encryption of the mobile network and can able
change the temporary identity(TMSI) . Once the encryption algorithm of
GSM is broken, the attacker can intercept all unencrypted communications
made by the victim's smartphone.
 Attacks based on Wi Fi: WAP bridges the mobile world and the
Internet
Attacks based on communication networks
Attacks on Mobile WAP network
 Principle of Bluetooth based:
 The user receives a virus via Bluetooth when the phone is in
discoverable mode In this case, the virus spreads like an
airborne illness.
 The WAP protocol is now the leading standard for information services on
wireless terminals like digital mobile phones. By the use of WAP, there is a
possibility of wireless devices like mobile phones, getting infected with
virus and worms.
Attacks based on vulnerabilities in software
applications
 Web browser : Internet downloads - The virus spreads the same way a
traditional computer virus does. The user downloads an infected file to the phone by
way of a PC or the phone's own Internet connection. This may include file-sharing
downloads, applications available from add-on sites (such as ringtones or games)
and false security patches posted on the Symbian Web site.
Operating system:
Problem in updating os
Password cracking:
the possibility of cracking a device's password through a smudge attack. It is
literally imaging the finger smudges on the screen to discern the user's password .
The researchers were able to discern the device password up to 68% of the time
under certain conditions.
Malicious software (malware):
A malware is a computer program that aims to harm the system
in which it resides.
The three phases of malware attacks
 Infection
 Accomplishment of its goal
 Spread to other systems
Examples of malware
Viruses and trojans
Spyware
 A Trojan is a program that is on the smartphone and allows external users to
connect discreetly . ex; red browser based on java, spyware based on simbion
 A worm is a program that reproduces on multiple computers across a network.
 A virus is malicious software designed to spread to other computers by inserting
itself into legitimate programs and
running programs in parallel.
Protecting Your Phone
 Turn off Bluetooth discoverable mode
 Check security updates to learn about
filenames you should keep an eye out
for.
 Install some type of security software on
your phone.
 Memory Protection.
 Spam filters.
 Not always changed Default
settings.
Conclusion:
The best way to protect yourself from cell-phone viruses is the same way you
protect yourself from computer viruses: Never open anything if you don't know
what it is, haven't requested it or have any suspicions whatsoever that it's not what
it claims to be. That said, even the most cautious person can still end up with an
infected phone.
Sources
1."Cell-Phone Viruses."
TechnologyReview.com.http://www.technologyreview.com/articles/05/05/issu
e/feature_emerging.asp?p=9
2."Cell phone virus turns up the heat."
News.com.http://news.com.com/Cell+phone+virus+turns+up+the+heat/2100 -
7349_3-5520003.html
3."Clock's ticking on phone virus outbreak, experts say."
News.com.http://news.com.com/Clocks+ticking+on+phone+virus+outbreak%
2C+experts+say/2100-7349_3-5756428.html?tag=mainstry
4. European Telecommunications Standards Institute (2011). "3GPP Confidentiality and
Integrity Algorithms &UEA1 UIA1".[dead link]
5. Mobile security Wikipedia, the free encyclopedia
Treads to mobile network

More Related Content

What's hot

Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.iCreateWorld
 
Mobile security
Mobile securityMobile security
Mobile securityMphasis
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniDr Raghu Khimani
 
Cyber Security - Unit - 5 - Introduction to Cyber Crime Investigation
Cyber Security - Unit - 5 - Introduction to Cyber Crime InvestigationCyber Security - Unit - 5 - Introduction to Cyber Crime Investigation
Cyber Security - Unit - 5 - Introduction to Cyber Crime InvestigationGyanmanjari Institute Of Technology
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile securityPushkar Pashupat
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology vijay rastogi
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeMangesh wadibhasme
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Rooting Android Devices
Rooting Android DevicesRooting Android Devices
Rooting Android DevicesLokendra Rawat
 
Android Security
Android SecurityAndroid Security
Android SecurityLars Jacobs
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network SecuritySachithra Gayan
 

What's hot (20)

Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.
 
Mobile security
Mobile securityMobile security
Mobile security
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
Cyber Security - Unit - 5 - Introduction to Cyber Crime Investigation
Cyber Security - Unit - 5 - Introduction to Cyber Crime InvestigationCyber Security - Unit - 5 - Introduction to Cyber Crime Investigation
Cyber Security - Unit - 5 - Introduction to Cyber Crime Investigation
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
File Carving
File CarvingFile Carving
File Carving
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Mobile operating systems
Mobile operating systemsMobile operating systems
Mobile operating systems
 
Rooting Android Devices
Rooting Android DevicesRooting Android Devices
Rooting Android Devices
 
Wireless Multimedia
Wireless Multimedia Wireless Multimedia
Wireless Multimedia
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Android Security
Android SecurityAndroid Security
Android Security
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
Tracking Emails
Tracking EmailsTracking Emails
Tracking Emails
 

Similar to Treads to mobile network

MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYJASHU JASWANTH
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & wormsSourav Verma
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Securityguestc03f28
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Securitymanish kumar
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malwareSytelReplyUK
 
Computer viruses
Computer virusesComputer viruses
Computer virusesDark Side
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and securityAkhil Kumar
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile securityKavita Rastogi
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
Report of android hacking
Report of android hackingReport of android hacking
Report of android hackingdiv2345
 
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxmobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxvrandmandora1
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 

Similar to Treads to mobile network (20)

MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
Cp3201 mobile security final
Cp3201 mobile security finalCp3201 mobile security final
Cp3201 mobile security final
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
C3
C3C3
C3
 
Smartphone
SmartphoneSmartphone
Smartphone
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Information security
Information securityInformation security
Information security
 
Report of android hacking
Report of android hackingReport of android hacking
Report of android hacking
 
M
MM
M
 
Mobile security
Mobile securityMobile security
Mobile security
 
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxmobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
 
Mobile Malware
Mobile MalwareMobile Malware
Mobile Malware
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 

Recently uploaded

9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7Pooja Nehwal
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceanilsa9823
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceanilsa9823
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Niamh verma
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...wyqazy
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Pooja Nehwal
 

Recently uploaded (7)

9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
 

Treads to mobile network

  • 2. CONTENTS:  Introduction  Threads  Types of threads  Protecting your phone  conclusion
  • 4. Can virus infect the mobile phones?
  • 5.  The answer is YES. The first known cell-phone virus appeared in 2004 is cabir.  The chance is increasing day by day and recent hoax virus, Spam SMS worms is an evidence of it. Due to the financial aspects associated with wireless communications, this subject is under through research now.
  • 6. Cell-phone Virus Basics:  A cell-phone virus is basically the same thing as a computer virus .an unwanted executable file that "infects" a device and then copies itself to other devices. But whereas a computer virus or worm spreads through e- mail attachments and Internet downloads, a cell-phone virus or worm spreads via Internet downloads, MMS attachments and Bluetooth transfers.  The most common type of cell-phone infection right now occurs when a cell phone downloads an infected file from a PC or the Internet ,or phone to phone.
  • 7. Threats:  A mobile phone user especially smartphone user is exposed to various threats when they use their phone. In the last two quarters of 2012, the number of unique mobile threats grew by 26.1%, according to ABI (Allied Business Intelligence Research).These threats can disrupt the operation of the smartphone, and transmit or modify user data  Problems to mobiles Dew to these threads  Data : data management, therefore they may contain sensitive data like credit card numbers, authentication information, private information, activity logs.  Identity : To steal the identity of the owner of a smartphone to commit other.  Availability
  • 8. Different types of threats or attacks on mobile security  Attack based on communication (SMS and MMS)  Attacks based on communication networks  Attacks based on vulnerabilities in software applications  Password cracking  Malicious software (malware)
  • 9. Attack based on communication (SMS and MMS)  Infected text messages sometimes steal the subject line from a message you have received from a friend(chinese characters), which of course increases the likelihood of your opening it.  A virus that spreads via MMS gets into the phone's contact list and sends itself to every phone number stored there.  In all of these transfer methods, the user has to agree at least once (and usually twice) to run the infected file.
  • 10.  Attacks based on the GSM networks: These are form dew to the miss matching of encryption algorithms. The attacker may try to break the encryption of the mobile network and can able change the temporary identity(TMSI) . Once the encryption algorithm of GSM is broken, the attacker can intercept all unencrypted communications made by the victim's smartphone.  Attacks based on Wi Fi: WAP bridges the mobile world and the Internet Attacks based on communication networks
  • 11. Attacks on Mobile WAP network
  • 12.  Principle of Bluetooth based:  The user receives a virus via Bluetooth when the phone is in discoverable mode In this case, the virus spreads like an airborne illness.  The WAP protocol is now the leading standard for information services on wireless terminals like digital mobile phones. By the use of WAP, there is a possibility of wireless devices like mobile phones, getting infected with virus and worms.
  • 13. Attacks based on vulnerabilities in software applications  Web browser : Internet downloads - The virus spreads the same way a traditional computer virus does. The user downloads an infected file to the phone by way of a PC or the phone's own Internet connection. This may include file-sharing downloads, applications available from add-on sites (such as ringtones or games) and false security patches posted on the Symbian Web site.
  • 15. Password cracking: the possibility of cracking a device's password through a smudge attack. It is literally imaging the finger smudges on the screen to discern the user's password . The researchers were able to discern the device password up to 68% of the time under certain conditions.
  • 16. Malicious software (malware): A malware is a computer program that aims to harm the system in which it resides. The three phases of malware attacks  Infection  Accomplishment of its goal  Spread to other systems Examples of malware Viruses and trojans Spyware
  • 17.  A Trojan is a program that is on the smartphone and allows external users to connect discreetly . ex; red browser based on java, spyware based on simbion  A worm is a program that reproduces on multiple computers across a network.  A virus is malicious software designed to spread to other computers by inserting itself into legitimate programs and running programs in parallel.
  • 18. Protecting Your Phone  Turn off Bluetooth discoverable mode  Check security updates to learn about filenames you should keep an eye out for.  Install some type of security software on your phone.  Memory Protection.  Spam filters.  Not always changed Default settings.
  • 19. Conclusion: The best way to protect yourself from cell-phone viruses is the same way you protect yourself from computer viruses: Never open anything if you don't know what it is, haven't requested it or have any suspicions whatsoever that it's not what it claims to be. That said, even the most cautious person can still end up with an infected phone.
  • 20. Sources 1."Cell-Phone Viruses." TechnologyReview.com.http://www.technologyreview.com/articles/05/05/issu e/feature_emerging.asp?p=9 2."Cell phone virus turns up the heat." News.com.http://news.com.com/Cell+phone+virus+turns+up+the+heat/2100 - 7349_3-5520003.html 3."Clock's ticking on phone virus outbreak, experts say." News.com.http://news.com.com/Clocks+ticking+on+phone+virus+outbreak% 2C+experts+say/2100-7349_3-5756428.html?tag=mainstry 4. European Telecommunications Standards Institute (2011). "3GPP Confidentiality and Integrity Algorithms &UEA1 UIA1".[dead link] 5. Mobile security Wikipedia, the free encyclopedia

Editor's Notes

  1. Contents
  2. Can mobiles