Modern smartphones are becoming technologically more advance and so does the latest security threats and risks.Though all mobile os, including android ,are trying to be accurate and block all the loopholes ; but there are always some drawbacks, as complication arises.So programmers have to balance between them. Functionality and security are inverse to each other.It means that if a system is supposed to be functionally better, then it's security is not that much perfect.Programmers have to balance between them, they have consider both functionality and security. So, there always exists some security loopholes.
1. Cyber criminals are using phony applications and messages to hijack mobile.
2.Open Wi-fi increases the security risks.
3.Android and windows devices are reported that often targeted by spyware, including one system called FinFisher, capable of taking a mobile device, or Loozfon, "an information-stealing piece of malware."
4.Some fraudsters are using Twitter ads offering special discounts for popular gifts, linking to malicious software.
5.Be careful what you do on public Wi-Fi networks especially when you're shopping. Do not expose passwords, account numbers or credit card information unless you are certain that you are on a secure connection.
So, you have to use secure wi-fi and download apps for trusted website.
Saturday, November 24, 2012
Subscribe to:
Post Comments (Atom)
Popular Posts
-
I am quite sure that most of us would have had our blood pressure readings taken at least once in our lives, and more often than not, all of...
-
Far Cry: We’d been told it was an ‘open world’ game, but everything Ubisoft showed of it made it look like a monologue-heavy, tigh...
-
Apple iPhone 5 review you were taking a college course called iPhone 101, your professor might identify three factors that have...
-
Samsung Galaxy Premier Galaxy Premier is an Android smartphone with Super AMOLED HD display, 1.2 GHz Dual Core processor and 2100 mAh ba...
-
Windows 8 Review: Reviewing an operating system is one of the most difficult to do, as the full power of an operating system can neve...

No comments:
Post a Comment