SlideShare a Scribd company logo
1 of 46
contextIntroduction
History
forerunners
Operating systems
Importance
Uses of smartphones
General uses of smartphones
Advantages of smartphones
Disadvantages of smartphones
Security and threats
Methods of hacking
Continual growth of smartphones
Future of smartphones
Prevention from hacking
Conclusion
References
introduction
Smartphone:
“A Smartphone is a mobile phone built on a mobile operating system, with
more advanced computing capability and connectivity than a feature
phone.”
• Smartphones becoming order of the day
• Human race shifting from physical effort to digital workload
History
• Theodore G. Paraskevakos was the first one to introduce combined
telephony and computing in 1971
• He introduced concepts of intelligence, data processing and visual display
screens into telephones which gave rise to the "Smartphone.“
• Original and historic working models are still in the possession of
Paraskevakos
forerunners
• First mobile phone to incorporate PDA features was an IBM prototype
developed in 1992
• Its refined version was marketed to consumers in 1994 by BellSouth under
the name Simon Personal Communicator
• Simon was the first cellular device that can be properly referred to as a
"smartphone", although it wasn't called a smartphone in 1994
•It was also able to send and receive faxes and e-mails
•Simon included apps like address book, calendar,
appointment scheduler, calculator, world time clock etc.
•The term "smart phone" appeared in print in 1995, for
describing AT&T's "Phone Writer(TM) Communicator" as
a "smart phone".
Operating system
These are some famous OS for smartphones. Some of them are now out dated
as the most recent OS took over in past several years.
• Symbian
• Windows Phone
• Black Berry
• Android
• iOS (Apple)
• Palm OS
• Bada
Importance
Smartphones are
Handy
 efficient
 intelligent
 elegant
Seemed to be more ‘secure’
• According to the surveys since 2010, it is self -evident that more than 50% population of
America, China, Europe, India and Middle East has been using smartphones.
Uses of smartphones
For students:
• Dictionaries are easy access in Smart phones
• Access to the internet for research and referencing
• The ability to snap a picture of the day’s homework assignment scribbled on a
whiteboard or take a short video of a key lecture moment
• Recording lectures with Voice Memo and other third-party note-taking apps
• Keeping track of schedules and dates
• Use of translator to break language barriers
• Allow students to check their grades via on-line
Applications:
Following are the applications mostly used by students via smartphones
Oxford American Dictionary and Thesaurus
Adobe Reader
Word
Translate Language
Anatomy 3D
Smart Kid Math
Remind
For Businessman
• Finding your way: Your phone's GPS can get you to appointments on time, even if you're in a
strange city far from home
• Access Customer Data: Many CRMs (Customer Relationship Management) allow you to connect
from your smartphone and pull out useful data on prospects and customer
• Schedule-Keeping: Smart phones have apps that allow you to record not only who and where, but
also your notes about the impending appointment
• Contacts at your fingertips: A smartphone makes your entire address book available to you at all
times. So if you suddenly need to call your former co-worker from the road to provide an introduction
to a new prospect, it's not a problem
BUSSINESS Applications:
These are the applications mostly used by Businessmen via smartphones
Currency Converter
Net Bank
Contactually
Financial Calculator
Cash Control
For Medical:
• Smartphone will help u in maintaining your weight
• With the use of smartphones doctors can have correct information
about new medicines and there specifications
• Smartphones have apps which can remind the patient to take
medicines.
• Diabetic patients are blessed with the app Calorie calculator. It will
not let there sugar level down.
Medical Applications:
Some of the applications used in medical are
MedCalc
Up To Date
Doximity
Epocrates
General uses of smartphones:
• Instant Messaging
• Group Conversation
• Video Recording
• Voice Recording
• Bar Code reader
• Online Gaming
• Video Chatting
• Navigation
• On the go Document editing
Communication
• Call
• Text
• E-mail
• Video calling
• Social Networking
Web Everywhere
• Cellular coverage everywhere.
• Use of 3G & 4G.
• Wireless fidelity.
• Streaming high definition movies.
• Access of internet everywhere and anytime.
Endless Applications
The early twenty-first century brings hundreds of thousands of
smartphone apps. Here is a list of top 10 apps of all time.
1-Gmail 9-fruit ninja
2-Angry Birds 10-temple run
3-Chrome browser
4-Facebook
5-Skype
6-Twitter
7-WhatsApp Messenger
8-Adobe Flash Player
WIRELESS SHARING
Advantages of smartphones also extend to the field of sharing because
now you can share files wirelessly without the need of USB. Apps for
wirelessly sharing data are:
BLUETOOTH Sharing
Airdroid
Es file explorer
samba
Cost
• The biggest disadvantage of a smartphone is its cost compared to
standard mobile phones. A smartphone costs considerably more from
a feature phone.
• Smartphones also require expensive data plans which most standard
phones do not.
• Internet access is provided at an additional cost, raising the cost of
owning a smartphone.
Security
• Threats from SMS
This term is used to name phishing attempts sent via SMS,
and is used to fool victims into giving up personal data.
• Wi-Fi and Bluetooth Security Risks
Free Wi-Fi hotspots always look attractive, but they can
prove to be both rife with malware and provided by
scammers looking to capture your personal data such as
passwords, credit card data.
The Danger of Rogue Apps
•There are rogue apps on any platform whether
it is android, ios or windows phone.
•It’s no surprise that the number of threats for
Android has increased over the past few years.
EXAMPLE OF FAKE APP:
Android.Spyware.GoneSixty.Gen
Typing
• keyboard is significantly smaller on the smartphone interface
than it is on a computer and characters are packed closely
together, all of which limits how fast you can type.
Security and threats
 People use smartphones features to have efficiency and save their
time and energy
 As the trend goes on, people are becoming addicted to there
features
 People are very casual with their personal data which is a danger to
themselves
The features provided by the smartphone
companies and their operating systems are not
that much secure
 They have much vulnerability in them which
can be exploited in many different ways
 It makes a user unsecure and helpless in this
technologically active era
Methods of hacking
Following are the various methods used by hackers/attackers to hack into smartphones
for their purposes:
Snooping:
Software's allowing the hacker to access the data of a smartphone without the
permission and knowledge of Owner. E.g. Trojans
Phishing:
It is spam technique. Hacker would try to communicate a User , disguised as someone
User may know, and try to get information from him.
Network Spoofing:
Attacker can design a rouge network point and the smartphone can try to
connect with it automatically. This will give the attacker access to all the User’s
traffic
Wireless Hacking:
Wi fi can be hacked easily and all the incoming and outgoing data can be exploited.
Phone Cloning:
Not easy to work on, but soft wares are there to provide the cloning process of a phone.
Hacker can receive the calls, SMS of a User.
Dodgy Apps:
one of the mobile user’s weaknesses: these can gain access
to your contact list, phone calls, GPS location, and credit card
data, often without notifying you
they can also install spyware or malware on your
smartphone
Bluetooth:
Your Bluetooth connection can be hacked to provide access
to your phone any time it’s turned on, even when it’s turned
on but not in use
Biggest breach
To date, the biggest smartphone breach occurred on Google
Android phones. Users that downloaded certain wallpaper
applications actually opened their phones up to hackers who
harvested the phone and voice-mail numbers, as well as data
used to disclose a user's physical location. The wallpapers
were downloaded more than 1 million times, and information
was transmitted to a Chinese Website. In one week, Google
had to take down more than 80 such applications to protect
its users.
Continual growth of smartphones
According to New York times total sales of smartphones will reach 1.2 billion
units before the end of the 2014, a 23.1 percent increase over 2013
Android continues to dominate these sales with an estimated market share of
80.2 percent in 2014
Smartphone adoption reflects the trend toward emerging market growth in the
wider technology device space
Future of smartphones
Flexible Screens:
It may soon be the case where smartphones are able provide a large screen to watch and
play your favorite movies and games while maintaining a pocket able size. Screens can be
folded and unfolded
In-Built Projector:
It features a built-in DLP (Digital Light Projection) WVGA projector that is able to project
future-features-smart-phones at up to 50 inches in size at 15 lumens
3D Screens & Holograms
 At present, we have a couple of 3D smartphones in the market, such as the LG
Optimus 3D, the Motorola MT810 but next path could possibly be holographic
projections
These will be a combination of 3D future-features-smart-phones/ and
projections from the smartphone
Enhance the environment
 In future, smartphones will be able to layer the world we perceive
through our senses with enhanced informational content: maps,
tags, suggestions, even ads, appearing and fading as we walk down
the street
Prevention from hacking
Be sure to change your phone's remote access PIN
Use strong passwords that would be difficult for anyone to guess
 Turn off auto-complete so that passwords aren't stored on your phone
 Delete your browsing history frequently
Don’t leave your phone unattended in a public place
Avoid using unprotected Bluetooth networks and turn off your when you
aren’t using it
 Use a protected app to store pin numbers and credit cards
Avoid accessing important locations such as bank accounts via public Wi-
Fi that may not be secure
conclusion
Smartphones have a combined influence on
people. People are becoming anti-social and
because of it people get scammed easily
whereas on the other hand these are very
helpful in everyway and have made lots of
things easier for the human race.
References
• www.google.com
Smartphones 2015

More Related Content

What's hot

Smartphone and its features
Smartphone and its features Smartphone and its features
Smartphone and its features Liton Ahmed
 
Smart uses of smart phone for students
Smart uses of smart phone for studentsSmart uses of smart phone for students
Smart uses of smart phone for studentsSaransh Arora
 
World without mobile phones
World without mobile phonesWorld without mobile phones
World without mobile phonesNarayan Murthy
 
Mobile uses in colleges
Mobile uses in collegesMobile uses in colleges
Mobile uses in collegesREELA_MALA
 
Smatphone present
Smatphone presentSmatphone present
Smatphone presentmpho12
 
Is Mobile Really Necessary?
Is Mobile Really Necessary?Is Mobile Really Necessary?
Is Mobile Really Necessary?Tiffini Travis
 
Adp 1003 powrpoint
Adp 1003  powrpointAdp 1003  powrpoint
Adp 1003 powrpointcollopen
 
Presentation on smartphone by Apu
Presentation on smartphone by ApuPresentation on smartphone by Apu
Presentation on smartphone by ApuAshiqul Islam Apu
 
Mobile technology
Mobile technologyMobile technology
Mobile technologyhillarz
 
Advantages and Disadvantages of Mobile Phone
Advantages and Disadvantages of Mobile PhoneAdvantages and Disadvantages of Mobile Phone
Advantages and Disadvantages of Mobile PhoneSoumik Shuvra Dey
 
Smartphone's and their effects
Smartphone's and their effectsSmartphone's and their effects
Smartphone's and their effectsSushil Jeewa
 
Uses and Abuses of Mobile Phone
Uses and Abuses of Mobile PhoneUses and Abuses of Mobile Phone
Uses and Abuses of Mobile PhoneMd. Tarikul Islam
 
Introduction to Smart phones
Introduction to Smart phonesIntroduction to Smart phones
Introduction to Smart phonesRocker ʌvinʌsh
 
Smartphones
SmartphonesSmartphones
SmartphonesEnigma
 
Social impact of smart phones
Social impact of smart phonesSocial impact of smart phones
Social impact of smart phonesKonAlves
 

What's hot (20)

Smartphone and its features
Smartphone and its features Smartphone and its features
Smartphone and its features
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Smart uses of smart phone for students
Smart uses of smart phone for studentsSmart uses of smart phone for students
Smart uses of smart phone for students
 
World without mobile phones
World without mobile phonesWorld without mobile phones
World without mobile phones
 
Mobile uses in colleges
Mobile uses in collegesMobile uses in colleges
Mobile uses in colleges
 
Smatphone present
Smatphone presentSmatphone present
Smatphone present
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Is Mobile Really Necessary?
Is Mobile Really Necessary?Is Mobile Really Necessary?
Is Mobile Really Necessary?
 
Adp 1003 powrpoint
Adp 1003  powrpointAdp 1003  powrpoint
Adp 1003 powrpoint
 
Presentation on smartphone by Apu
Presentation on smartphone by ApuPresentation on smartphone by Apu
Presentation on smartphone by Apu
 
Mobile technology
Mobile technologyMobile technology
Mobile technology
 
Mobile devices
Mobile devicesMobile devices
Mobile devices
 
Advantages and Disadvantages of Mobile Phone
Advantages and Disadvantages of Mobile PhoneAdvantages and Disadvantages of Mobile Phone
Advantages and Disadvantages of Mobile Phone
 
smart phone
smart phonesmart phone
smart phone
 
Smart phone
Smart phoneSmart phone
Smart phone
 
Smartphone's and their effects
Smartphone's and their effectsSmartphone's and their effects
Smartphone's and their effects
 
Uses and Abuses of Mobile Phone
Uses and Abuses of Mobile PhoneUses and Abuses of Mobile Phone
Uses and Abuses of Mobile Phone
 
Introduction to Smart phones
Introduction to Smart phonesIntroduction to Smart phones
Introduction to Smart phones
 
Smartphones
SmartphonesSmartphones
Smartphones
 
Social impact of smart phones
Social impact of smart phonesSocial impact of smart phones
Social impact of smart phones
 

Viewers also liked

Smartphones powerpoint presentation
Smartphones powerpoint presentationSmartphones powerpoint presentation
Smartphones powerpoint presentationnhla4
 
Ppt on World Of Smartphones
Ppt on World Of SmartphonesPpt on World Of Smartphones
Ppt on World Of SmartphonesPulkit Syal
 
ATOP SMART WATCH
ATOP SMART WATCHATOP SMART WATCH
ATOP SMART WATCHVictor Zhu
 
Gps (global positioning system)
Gps (global positioning system)Gps (global positioning system)
Gps (global positioning system)Yousuf S A
 
Smartphones Slideshow Presentation
Smartphones Slideshow PresentationSmartphones Slideshow Presentation
Smartphones Slideshow Presentationraz_bhana07
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computersnorzaini
 
Introduction to computer
Introduction  to  computerIntroduction  to  computer
Introduction to computerhina amir
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentalsarchikabhatia
 
Basic computer fundamentals
Basic computer fundamentalsBasic computer fundamentals
Basic computer fundamentalsJames Macalalad
 
History of Computers
History of ComputersHistory of Computers
History of Computersmshihab
 
Smartphones presentation
Smartphones presentationSmartphones presentation
Smartphones presentationfdla1
 
Introduction to Basic Computer Concepts Presentation
Introduction to Basic Computer Concepts PresentationIntroduction to Basic Computer Concepts Presentation
Introduction to Basic Computer Concepts PresentationAna Tan
 

Viewers also liked (20)

Smartphones powerpoint presentation
Smartphones powerpoint presentationSmartphones powerpoint presentation
Smartphones powerpoint presentation
 
Ppt on World Of Smartphones
Ppt on World Of SmartphonesPpt on World Of Smartphones
Ppt on World Of Smartphones
 
ATOP SMART WATCH
ATOP SMART WATCHATOP SMART WATCH
ATOP SMART WATCH
 
Gps (global positioning system)
Gps (global positioning system)Gps (global positioning system)
Gps (global positioning system)
 
Gis gps
Gis gpsGis gps
Gis gps
 
Gps
GpsGps
Gps
 
Gps
GpsGps
Gps
 
SMS
SMSSMS
SMS
 
Smartphones Slideshow Presentation
Smartphones Slideshow PresentationSmartphones Slideshow Presentation
Smartphones Slideshow Presentation
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computers
 
Introduction to computer
Introduction  to  computerIntroduction  to  computer
Introduction to computer
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentals
 
Basic computer fundamentals
Basic computer fundamentalsBasic computer fundamentals
Basic computer fundamentals
 
Types of computers
Types of computersTypes of computers
Types of computers
 
History of Computers
History of ComputersHistory of Computers
History of Computers
 
The Internet
The InternetThe Internet
The Internet
 
Smartphones presentation
Smartphones presentationSmartphones presentation
Smartphones presentation
 
Introduction to Basic Computer Concepts Presentation
Introduction to Basic Computer Concepts PresentationIntroduction to Basic Computer Concepts Presentation
Introduction to Basic Computer Concepts Presentation
 
Computer presentation
Computer presentationComputer presentation
Computer presentation
 
GPS ppt.
GPS ppt. GPS ppt.
GPS ppt.
 

Similar to Smartphones 2015

Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devicesjraja01
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone SecurityMalasta Hill
 
Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedAsyathShahina
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxtodd581
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxglendar3
 
IVRs and Smartphones
IVRs and SmartphonesIVRs and Smartphones
IVRs and SmartphonesAhmed Bouzid
 
Vulnerabilities in Mobile Devices
Vulnerabilities in Mobile DevicesVulnerabilities in Mobile Devices
Vulnerabilities in Mobile DevicesCSCJournals
 
Smartphone and mobile device safety & security
Smartphone and mobile device safety & securitySmartphone and mobile device safety & security
Smartphone and mobile device safety & securityAlbanMichael
 
Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015Allan Isfan
 
Netcetera Presentation on Mobile Marketing
Netcetera Presentation on Mobile MarketingNetcetera Presentation on Mobile Marketing
Netcetera Presentation on Mobile MarketingAberla
 
Mobile today-tomorrow-201006-aberla
Mobile today-tomorrow-201006-aberlaMobile today-tomorrow-201006-aberla
Mobile today-tomorrow-201006-aberlaNetcetera
 
Smart phones slide
Smart phones slideSmart phones slide
Smart phones slideZena_Nkula
 

Similar to Smartphones 2015 (20)

my smartphone
my smartphonemy smartphone
my smartphone
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devices
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
Technology in mobile
Technology in mobileTechnology in mobile
Technology in mobile
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
 
Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it used
 
SF 9 FCS UNIT 2.pptx
SF 9 FCS UNIT 2.pptxSF 9 FCS UNIT 2.pptx
SF 9 FCS UNIT 2.pptx
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
IVRs and Smartphones
IVRs and SmartphonesIVRs and Smartphones
IVRs and Smartphones
 
Vulnerabilities in Mobile Devices
Vulnerabilities in Mobile DevicesVulnerabilities in Mobile Devices
Vulnerabilities in Mobile Devices
 
Smartphone and mobile device safety & security
Smartphone and mobile device safety & securitySmartphone and mobile device safety & security
Smartphone and mobile device safety & security
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Smartphones
SmartphonesSmartphones
Smartphones
 
Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015
 
Netcetera Presentation on Mobile Marketing
Netcetera Presentation on Mobile MarketingNetcetera Presentation on Mobile Marketing
Netcetera Presentation on Mobile Marketing
 
Mobile today-tomorrow-201006-aberla
Mobile today-tomorrow-201006-aberlaMobile today-tomorrow-201006-aberla
Mobile today-tomorrow-201006-aberla
 
Smart phones slide
Smart phones slideSmart phones slide
Smart phones slide
 

More from Sheikh Ali Asghar

More from Sheikh Ali Asghar (8)

Dabur India project
Dabur India projectDabur India project
Dabur India project
 
Bank islami final project
Bank islami final projectBank islami final project
Bank islami final project
 
Bangkok presentation
Bangkok presentationBangkok presentation
Bangkok presentation
 
Accounting Ias 1 presentation
Accounting Ias 1 presentationAccounting Ias 1 presentation
Accounting Ias 1 presentation
 
Audit Evidence Presentation
Audit Evidence PresentationAudit Evidence Presentation
Audit Evidence Presentation
 
Ucp Assignment Paper
Ucp Assignment PaperUcp Assignment Paper
Ucp Assignment Paper
 
Canon presentation(hrm & pm)
Canon presentation(hrm & pm)Canon presentation(hrm & pm)
Canon presentation(hrm & pm)
 
Is there any chance of ww3
Is there any chance of ww3Is there any chance of ww3
Is there any chance of ww3
 

Recently uploaded

CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceanilsa9823
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝soniya singh
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...wyqazy
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceanilsa9823
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Niamh verma
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Pooja Nehwal
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7Pooja Nehwal
 

Recently uploaded (7)

CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7
 

Smartphones 2015

  • 1.
  • 2. contextIntroduction History forerunners Operating systems Importance Uses of smartphones General uses of smartphones Advantages of smartphones Disadvantages of smartphones Security and threats Methods of hacking Continual growth of smartphones Future of smartphones Prevention from hacking Conclusion References
  • 3. introduction Smartphone: “A Smartphone is a mobile phone built on a mobile operating system, with more advanced computing capability and connectivity than a feature phone.” • Smartphones becoming order of the day • Human race shifting from physical effort to digital workload
  • 4.
  • 5. History • Theodore G. Paraskevakos was the first one to introduce combined telephony and computing in 1971 • He introduced concepts of intelligence, data processing and visual display screens into telephones which gave rise to the "Smartphone.“ • Original and historic working models are still in the possession of Paraskevakos
  • 6. forerunners • First mobile phone to incorporate PDA features was an IBM prototype developed in 1992 • Its refined version was marketed to consumers in 1994 by BellSouth under the name Simon Personal Communicator • Simon was the first cellular device that can be properly referred to as a "smartphone", although it wasn't called a smartphone in 1994
  • 7. •It was also able to send and receive faxes and e-mails •Simon included apps like address book, calendar, appointment scheduler, calculator, world time clock etc. •The term "smart phone" appeared in print in 1995, for describing AT&T's "Phone Writer(TM) Communicator" as a "smart phone".
  • 8. Operating system These are some famous OS for smartphones. Some of them are now out dated as the most recent OS took over in past several years. • Symbian • Windows Phone • Black Berry • Android • iOS (Apple) • Palm OS • Bada
  • 9.
  • 10. Importance Smartphones are Handy  efficient  intelligent  elegant Seemed to be more ‘secure’ • According to the surveys since 2010, it is self -evident that more than 50% population of America, China, Europe, India and Middle East has been using smartphones.
  • 11. Uses of smartphones For students: • Dictionaries are easy access in Smart phones • Access to the internet for research and referencing • The ability to snap a picture of the day’s homework assignment scribbled on a whiteboard or take a short video of a key lecture moment • Recording lectures with Voice Memo and other third-party note-taking apps • Keeping track of schedules and dates • Use of translator to break language barriers • Allow students to check their grades via on-line
  • 12. Applications: Following are the applications mostly used by students via smartphones Oxford American Dictionary and Thesaurus Adobe Reader Word Translate Language Anatomy 3D Smart Kid Math Remind
  • 13. For Businessman • Finding your way: Your phone's GPS can get you to appointments on time, even if you're in a strange city far from home • Access Customer Data: Many CRMs (Customer Relationship Management) allow you to connect from your smartphone and pull out useful data on prospects and customer • Schedule-Keeping: Smart phones have apps that allow you to record not only who and where, but also your notes about the impending appointment • Contacts at your fingertips: A smartphone makes your entire address book available to you at all times. So if you suddenly need to call your former co-worker from the road to provide an introduction to a new prospect, it's not a problem
  • 14. BUSSINESS Applications: These are the applications mostly used by Businessmen via smartphones Currency Converter Net Bank Contactually Financial Calculator Cash Control
  • 15. For Medical: • Smartphone will help u in maintaining your weight • With the use of smartphones doctors can have correct information about new medicines and there specifications • Smartphones have apps which can remind the patient to take medicines. • Diabetic patients are blessed with the app Calorie calculator. It will not let there sugar level down.
  • 16. Medical Applications: Some of the applications used in medical are MedCalc Up To Date Doximity Epocrates
  • 17. General uses of smartphones: • Instant Messaging • Group Conversation • Video Recording • Voice Recording • Bar Code reader • Online Gaming • Video Chatting • Navigation • On the go Document editing
  • 18.
  • 19. Communication • Call • Text • E-mail • Video calling • Social Networking
  • 20. Web Everywhere • Cellular coverage everywhere. • Use of 3G & 4G. • Wireless fidelity. • Streaming high definition movies. • Access of internet everywhere and anytime.
  • 21.
  • 22. Endless Applications The early twenty-first century brings hundreds of thousands of smartphone apps. Here is a list of top 10 apps of all time. 1-Gmail 9-fruit ninja 2-Angry Birds 10-temple run 3-Chrome browser 4-Facebook 5-Skype 6-Twitter 7-WhatsApp Messenger 8-Adobe Flash Player
  • 23. WIRELESS SHARING Advantages of smartphones also extend to the field of sharing because now you can share files wirelessly without the need of USB. Apps for wirelessly sharing data are: BLUETOOTH Sharing Airdroid Es file explorer samba
  • 24.
  • 25.
  • 26.
  • 27. Cost • The biggest disadvantage of a smartphone is its cost compared to standard mobile phones. A smartphone costs considerably more from a feature phone. • Smartphones also require expensive data plans which most standard phones do not. • Internet access is provided at an additional cost, raising the cost of owning a smartphone.
  • 28. Security • Threats from SMS This term is used to name phishing attempts sent via SMS, and is used to fool victims into giving up personal data. • Wi-Fi and Bluetooth Security Risks Free Wi-Fi hotspots always look attractive, but they can prove to be both rife with malware and provided by scammers looking to capture your personal data such as passwords, credit card data.
  • 29. The Danger of Rogue Apps •There are rogue apps on any platform whether it is android, ios or windows phone. •It’s no surprise that the number of threats for Android has increased over the past few years. EXAMPLE OF FAKE APP: Android.Spyware.GoneSixty.Gen
  • 30. Typing • keyboard is significantly smaller on the smartphone interface than it is on a computer and characters are packed closely together, all of which limits how fast you can type.
  • 31.
  • 32. Security and threats  People use smartphones features to have efficiency and save their time and energy  As the trend goes on, people are becoming addicted to there features  People are very casual with their personal data which is a danger to themselves
  • 33. The features provided by the smartphone companies and their operating systems are not that much secure  They have much vulnerability in them which can be exploited in many different ways  It makes a user unsecure and helpless in this technologically active era
  • 34. Methods of hacking Following are the various methods used by hackers/attackers to hack into smartphones for their purposes: Snooping: Software's allowing the hacker to access the data of a smartphone without the permission and knowledge of Owner. E.g. Trojans Phishing: It is spam technique. Hacker would try to communicate a User , disguised as someone User may know, and try to get information from him.
  • 35. Network Spoofing: Attacker can design a rouge network point and the smartphone can try to connect with it automatically. This will give the attacker access to all the User’s traffic Wireless Hacking: Wi fi can be hacked easily and all the incoming and outgoing data can be exploited. Phone Cloning: Not easy to work on, but soft wares are there to provide the cloning process of a phone. Hacker can receive the calls, SMS of a User.
  • 36. Dodgy Apps: one of the mobile user’s weaknesses: these can gain access to your contact list, phone calls, GPS location, and credit card data, often without notifying you they can also install spyware or malware on your smartphone Bluetooth: Your Bluetooth connection can be hacked to provide access to your phone any time it’s turned on, even when it’s turned on but not in use
  • 37. Biggest breach To date, the biggest smartphone breach occurred on Google Android phones. Users that downloaded certain wallpaper applications actually opened their phones up to hackers who harvested the phone and voice-mail numbers, as well as data used to disclose a user's physical location. The wallpapers were downloaded more than 1 million times, and information was transmitted to a Chinese Website. In one week, Google had to take down more than 80 such applications to protect its users.
  • 38. Continual growth of smartphones According to New York times total sales of smartphones will reach 1.2 billion units before the end of the 2014, a 23.1 percent increase over 2013 Android continues to dominate these sales with an estimated market share of 80.2 percent in 2014 Smartphone adoption reflects the trend toward emerging market growth in the wider technology device space
  • 39.
  • 40. Future of smartphones Flexible Screens: It may soon be the case where smartphones are able provide a large screen to watch and play your favorite movies and games while maintaining a pocket able size. Screens can be folded and unfolded In-Built Projector: It features a built-in DLP (Digital Light Projection) WVGA projector that is able to project future-features-smart-phones at up to 50 inches in size at 15 lumens
  • 41. 3D Screens & Holograms  At present, we have a couple of 3D smartphones in the market, such as the LG Optimus 3D, the Motorola MT810 but next path could possibly be holographic projections These will be a combination of 3D future-features-smart-phones/ and projections from the smartphone Enhance the environment  In future, smartphones will be able to layer the world we perceive through our senses with enhanced informational content: maps, tags, suggestions, even ads, appearing and fading as we walk down the street
  • 42. Prevention from hacking Be sure to change your phone's remote access PIN Use strong passwords that would be difficult for anyone to guess  Turn off auto-complete so that passwords aren't stored on your phone  Delete your browsing history frequently
  • 43. Don’t leave your phone unattended in a public place Avoid using unprotected Bluetooth networks and turn off your when you aren’t using it  Use a protected app to store pin numbers and credit cards Avoid accessing important locations such as bank accounts via public Wi- Fi that may not be secure
  • 44. conclusion Smartphones have a combined influence on people. People are becoming anti-social and because of it people get scammed easily whereas on the other hand these are very helpful in everyway and have made lots of things easier for the human race.