SlideShare a Scribd company logo
1 of 9
Smart phones are evil! Roxy De villiers
Smart phones are evil! Hello cybercrime: Viruses Billed for unauthorized charges Personal info not so personal
Do these even look like phones?
What do the figures say? 57% jump in smart phones from a year ago (IDC, 2010) 500 mobile phone viruses.(Hypponnen, 2010) Trojan (Kaspersky Lab, 2010) has already affected mobile devices
Research Lookout investigated: If personal information is being stolen How it is being stolen Why it is happening
The result…
Should more research be done? Yes!: To educate people To answer all those questions we wonder about Get the ‘how to’ on being safe
How we can fight cyber crime? Downloading from trusted sources Check permissions Download mobile security applications No online banking via unofficial applications
Deductions Smart phones are taken lightly Are being attacked by hackers Are not safe if you do not follow protocol With great power comes great responsibility…

More Related Content

What's hot

The COVID-19 Phishing Threats to Watch Out For
The COVID-19 Phishing Threats to Watch Out ForThe COVID-19 Phishing Threats to Watch Out For
The COVID-19 Phishing Threats to Watch Out ForBeth Rigby
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansMaurice Dawson
 
Youtube videos might hijack your phone
Youtube videos might hijack your phoneYoutube videos might hijack your phone
Youtube videos might hijack your phoneniraj joshi
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone securityManish Gupta
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeAdeel Rasheed
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for childrenSaurav Jha
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
cell phone viruses and security
cell phone viruses and securitycell phone viruses and security
cell phone viruses and securityPRIYANKA944
 

What's hot (20)

Spy android malware - eScan
Spy android malware - eScanSpy android malware - eScan
Spy android malware - eScan
 
The COVID-19 Phishing Threats to Watch Out For
The COVID-19 Phishing Threats to Watch Out ForThe COVID-19 Phishing Threats to Watch Out For
The COVID-19 Phishing Threats to Watch Out For
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New Orleans
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
phishing
phishingphishing
phishing
 
Comslide 3
Comslide 3Comslide 3
Comslide 3
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Youtube videos might hijack your phone
Youtube videos might hijack your phoneYoutube videos might hijack your phone
Youtube videos might hijack your phone
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
cell phone viruses and security
cell phone viruses and securitycell phone viruses and security
cell phone viruses and security
 

Viewers also liked

StoraEnso - Umwelterklärung 2011
StoraEnso - Umwelterklärung 2011StoraEnso - Umwelterklärung 2011
StoraEnso - Umwelterklärung 2011Staples Germany
 
Renacimiento Quattrocento
Renacimiento QuattrocentoRenacimiento Quattrocento
Renacimiento QuattrocentoEvaPaula
 
кумедні закони сша (учнівська презентація)
кумедні закони сша (учнівська презентація)кумедні закони сша (учнівська презентація)
кумедні закони сша (учнівська презентація)Allya5
 
Verp project with newly qualified social workers
Verp  project with newly qualified social workersVerp  project with newly qualified social workers
Verp project with newly qualified social workersIriss
 
Kalpitiya - Eco System Blending with Water
Kalpitiya - Eco System Blending with WaterKalpitiya - Eco System Blending with Water
Kalpitiya - Eco System Blending with WaterRusLanka Council
 
Redes sociales en campanas institucionales por Angel Arellano
Redes sociales en campanas institucionales por Angel ArellanoRedes sociales en campanas institucionales por Angel Arellano
Redes sociales en campanas institucionales por Angel ArellanoAngel Arellano Quiaro
 
Методология ведения проектов
Методология ведения проектовМетодология ведения проектов
Методология ведения проектовAlexanderAvva
 
Перший закон термодинаміки
Перший закон термодинамікиПерший закон термодинаміки
Перший закон термодинамікиwyklyuk
 
Published patent and design registration information October 11th, 2013
Published patent and design registration information   October 11th, 2013Published patent and design registration information   October 11th, 2013
Published patent and design registration information October 11th, 2013InvnTree IP Services Pvt. Ltd.
 
Expansionismo Europeu
Expansionismo EuropeuExpansionismo Europeu
Expansionismo EuropeuCarlos Vieira
 
Introduction to Mobile Core Network
Introduction to Mobile Core NetworkIntroduction to Mobile Core Network
Introduction to Mobile Core Networkyusufd
 

Viewers also liked (14)

StoraEnso - Umwelterklärung 2011
StoraEnso - Umwelterklärung 2011StoraEnso - Umwelterklärung 2011
StoraEnso - Umwelterklärung 2011
 
Renacimiento Quattrocento
Renacimiento QuattrocentoRenacimiento Quattrocento
Renacimiento Quattrocento
 
кумедні закони сша (учнівська презентація)
кумедні закони сша (учнівська презентація)кумедні закони сша (учнівська презентація)
кумедні закони сша (учнівська презентація)
 
Soboleva
SobolevaSoboleva
Soboleva
 
Verp project with newly qualified social workers
Verp  project with newly qualified social workersVerp  project with newly qualified social workers
Verp project with newly qualified social workers
 
Kalpitiya - Eco System Blending with Water
Kalpitiya - Eco System Blending with WaterKalpitiya - Eco System Blending with Water
Kalpitiya - Eco System Blending with Water
 
Redes sociales en campanas institucionales por Angel Arellano
Redes sociales en campanas institucionales por Angel ArellanoRedes sociales en campanas institucionales por Angel Arellano
Redes sociales en campanas institucionales por Angel Arellano
 
Методология ведения проектов
Методология ведения проектовМетодология ведения проектов
Методология ведения проектов
 
Перший закон термодинаміки
Перший закон термодинамікиПерший закон термодинаміки
Перший закон термодинаміки
 
Published patent and design registration information October 11th, 2013
Published patent and design registration information   October 11th, 2013Published patent and design registration information   October 11th, 2013
Published patent and design registration information October 11th, 2013
 
Bb
BbBb
Bb
 
Expansionismo Europeu
Expansionismo EuropeuExpansionismo Europeu
Expansionismo Europeu
 
Shared interest graph
Shared interest graphShared interest graph
Shared interest graph
 
Introduction to Mobile Core Network
Introduction to Mobile Core NetworkIntroduction to Mobile Core Network
Introduction to Mobile Core Network
 

Similar to Smartphones

Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile securityKavita Rastogi
 
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxmobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxvrandmandora1
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone SecurityGuneet Pahwa
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaAnjoum .
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 aMark Henshaw
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperKen Spencer Brown
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfSoo Chin Hock
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptxRajviNikeetaRathore
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia WatsonPatricia M Watson
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityJay Moliya
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfCASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfkostikjaylonshaewe47
 

Similar to Smartphones (20)

Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
unit 2.pptx
unit 2.pptxunit 2.pptx
unit 2.pptx
 
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxmobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
 
Cp3201 mobile security final
Cp3201 mobile security finalCp3201 mobile security final
Cp3201 mobile security final
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone Security
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia Watson
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfCASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
 

Smartphones

  • 1. Smart phones are evil! Roxy De villiers
  • 2. Smart phones are evil! Hello cybercrime: Viruses Billed for unauthorized charges Personal info not so personal
  • 3. Do these even look like phones?
  • 4. What do the figures say? 57% jump in smart phones from a year ago (IDC, 2010) 500 mobile phone viruses.(Hypponnen, 2010) Trojan (Kaspersky Lab, 2010) has already affected mobile devices
  • 5. Research Lookout investigated: If personal information is being stolen How it is being stolen Why it is happening
  • 7. Should more research be done? Yes!: To educate people To answer all those questions we wonder about Get the ‘how to’ on being safe
  • 8. How we can fight cyber crime? Downloading from trusted sources Check permissions Download mobile security applications No online banking via unofficial applications
  • 9. Deductions Smart phones are taken lightly Are being attacked by hackers Are not safe if you do not follow protocol With great power comes great responsibility…