Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Mobile computing
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Security issues involved in mobile== {{main article|Mobile security}} [[Mobile security]] has become increasingly important in mobile computing. It is of particular concern as it relates to the [[information security|security]] of personal information now stored on the [[smartphone]]. Mobile applications might copy user data from these devices to a remote server without the users’ permission and often without the users’ consent.<ref>{{cite web |url=https://www.abc.net.au/news/2019-09-05/apple-iphones-could-have-been-hacked-for-years-%E2%80%93-heres-what-to/11481206 |title=Apple iPhones could have been hacked for years — here's what to do about it |last1=Sikos |first1=Leslie F. |last2=Haskell-Dowland |first2=Paul |date=5 Sep 2019 |publisher=ABC News |access-date=2019-12-10 |archive-date=2019-09-09 |archive-url=https://web.archive.org/web/20190909011141/https://www.abc.net.au/news/2019-09-05/apple-iphones-could-have-been-hacked-for-years-%E2%80%93-heres-what-to/11481206 |url-status=live }}</ref> The user profiles automatically created in the cloud for smartphone users raise [[privacy]] concerns on all major platforms, in terms of, including, but not limited to, [[mobile phone tracking|location tracking]]<ref>{{cite web | url=https://www.cnet.com/news/google-sued-over-keeping-location-data-amid-privacy-concerns/ | title=Google sued over tracking user location amid privacy concerns | first=Laura | last=Hautala | date=20 August 2018 | publisher=CNET | access-date=10 December 2019 | archive-date=10 December 2019 | archive-url=https://web.archive.org/web/20191210071243/https://www.cnet.com/news/google-sued-over-keeping-location-data-amid-privacy-concerns/ | url-status=live }}</ref> and personal data collection,<ref>{{cite web | url=https://www.cpomagazine.com/data-privacy/pre-installed-apps-on-android-represent-a-threat-to-user-privacy-and-security/ | title=Pre-Installed Apps on Android Represent a Threat to User Privacy and Security | first=Nicole | last=Lindsey | publisher=CPO Magazine | date=10 April 2019 | access-date=10 December 2019 | archive-date=10 December 2019 | archive-url=https://web.archive.org/web/20191210071243/https://www.cpomagazine.com/data-privacy/pre-installed-apps-on-android-represent-a-threat-to-user-privacy-and-security/ | url-status=live }}</ref> regardless of user settings on the device.<ref>{{cite web | url=https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile | title=Google records your location even when you tell it not to | work=The Guardian | date=14 August 2018 | access-date=10 December 2019 | archive-date=10 December 2019 | archive-url=https://web.archive.org/web/20191210071239/https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile | url-status=live }}</ref> More and more users and businesses use smartphones as a means of planning and organizing their work and private life. Within companies, these technologies are causing profound changes in the organization of [[information systems]] and therefore they have become the source of new risks. Indeed, smartphones collect and compile an increasing amount of sensitive information to which access must be controlled to protect the [[information privacy|privacy]] of the user and the [[intellectual property]] of the company. All smartphones are preferred targets of attacks. These attacks exploit weaknesses related to smartphones that can come from means of wireless telecommunication like [[WiFi|WiFi networks]] and [[GSM]]. There are also attacks that exploit software vulnerabilities from both the web browser and operating system. Finally, there are forms of [[malware|malicious software]] that rely on the weak knowledge of average users. Different security counter-measures are being developed and applied to smartphones, from security in different layers of software to the dissemination of information to end-users. There are good practices to be observed at all levels, from design to use, through the development of [[operating system]]s, software layers, and downloadable apps.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)