Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Smartphone
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Security=== {{Main|Mobile security|Malware|Mobile virus|Media Transfer Protocol}} Smartphone malware is easily distributed through an insecure app store.<ref name="Juniper-malware">[http://globalthreatcenter.com/?p=2492 Mobile Malware Development Continues To Rise, Android Leads The Way].</ref><ref name=trustbus11>{{cite book|title=8th International Conference on Trust, Privacy & Security in Digital Business (TRUSTBUS-2011)|year=2011|publisher=Springer Berlin / Heidelberg|pages=49β61|first1=Mylonas |last1=Alexios |first2=Tsoumas |last2=Bill |first3=Dritsas |last3=Stelios |first4=Gritzalis |last4=Dimitris }}</ref> Often, malware is hidden in [[Copyright infringement of software|pirated]] versions of legitimate apps, which are then distributed through third-party app stores.<ref>{{cite web |url=http://www.androidpolice.com/2011/03/01/the-mother-of-all-android-malware-has-arrived-stolen-apps-released-to-the-market-that-root-your-phone-steal-your-data-and-open-backdoor/ |title = The Mother Of All Android Malware Has Arrived |work=Android Police |date=March 6, 2011 }}</ref><ref>{{cite web |last=Perez |first=Sarah |url=http://www.readwriteweb.com/archives/android_vulnerability_so_dangerous_shouldnt_use_web_browser.php |title=Android Vulnerability So Dangerous, Owners Warned Not to Use Phone's Web Browser |publisher=Readwriteweb.com |date=February 12, 2009 |access-date=August 8, 2011 |url-status=dead |archive-url=https://web.archive.org/web/20110810074456/http://www.readwriteweb.com/archives/android_vulnerability_so_dangerous_shouldnt_use_web_browser.php |archive-date=August 10, 2011}}</ref> Malware risk also comes from what is known as an "update attack", where a legitimate application is later changed to include a malware component, which users then install when they are notified that the app has been updated.<ref name="Lookout-malware">{{cite web|url=http://www.appleinsider.com/articles/11/08/03/lookout_retrevio_warn_of_growing_android_malware_epidemic_note_apples_ios_is_far_safer.html |title=Lookout, Retrevo warn of growing Android malware epidemic, note Apple's iOS is far safer |publisher=Appleinsider.com |date=August 3, 2011 |access-date=January 5, 2012}}</ref> As well, one out of three robberies in 2012 in the United States involved the theft of a mobile phone. An online petition has urged smartphone makers to install [[kill switch]]es in their devices.<ref>{{cite web|url=http://www.sfexaminer.com/sanfrancisco/plea-urges-anti-theft-phone-tech/Content?oid=2447711|title=Plea urges anti-theft phone tech|work=The San Francisco Examiner|date=June 7, 2013|access-date=June 11, 2013|archive-date=October 16, 2014|archive-url=https://web.archive.org/web/20141016082504/http://www.sfexaminer.com/sanfrancisco/plea-urges-anti-theft-phone-tech/Content?oid=2447711|url-status=dead}}</ref> In 2014, Apple's "Find my iPhone" and Google's "Android Device Manager" can locate, disable, and wipe the data from phones that have been lost or stolen. With BlackBerry Protect in OS version 10.3.2, devices can be rendered unrecoverable to even BlackBerry's own Operating System recovery tools if incorrectly authenticated or dissociated from their account.<ref>{{cite web|url=http://helpblog.blackberry.com/2015/06/getting-started-with-anti-theft-protection-in-blackberry-10-os-version-10-3-2/|title=Getting started with Anti-Theft Protection in BlackBerry 10 OS version 10. - Inside BlackBerry Help Blog|work=blackberry.com|access-date=2016-01-18}}</ref> Leaked documents from 2013 to 2016 codenamed [[Vault 7]] detail the capabilities of the [[United States]] [[Central Intelligence Agency]] (CIA) to perform electronic surveillance and [[cyber warfare]], including the ability to compromise the operating systems of most smartphones (including iOS and Android).<ref>{{cite web|url=http://www.computing.co.uk/ctg/news/3006021/vault-7-wikileaks-reveals-details-of-cias-hacks-of-android-iphone-windows-linux-macos-and-even-samsung-tvs|title=Vault 7: Wikileaks reveals details of CIA's hacks of Android, iPhone Windows, Linux, MacOS, and even Samsung TVs|website=[[Computing (magazine)|Computing]]|date=7 March 2017}}</ref><ref>{{Cite magazine|url=https://www.wired.com/2017/03/cia-can-hack-phone-pc-tv-says-wikileaks/|title=How the CIA Can Hack Your Phone, PC, and TV (Says WikiLeaks)|last=Greenberg|first=Andy|date=2017-03-07|magazine=[[WIRED]] |language=en-US}}</ref> In 2021, journalists and researchers reported the discovery of [[spyware]], called [[Pegasus (spyware)|Pegasus]], developed and distributed by a private company which can and has been used to infect iOS and Android smartphones often{{Em dash}}partly via use of [[Zero-day (computing)|0-day exploits]]{{Em dash}}without the need for any user-interaction or significant clues to the user and then be used to exfiltrate data, track user locations, capture film through its camera, and activate the microphone at any time.<ref>{{cite news |title=What is Pegasus spyware and how does it hack phones? |url=https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones |access-date=13 August 2021 |work=The Guardian |date=18 July 2021 |language=en}}</ref> Analysis [[Packet analyzer|of data traffic]] by popular smartphones running variants of Android found substantial by-default data collection and sharing with no opt-out by this [[pre-installed software]].<ref>{{cite news |title=Study reveals scale of data-sharing from Android mobile phones |url=https://techxplore.com/news/2021-10-reveals-scale-data-sharing-android-mobile.html |access-date=16 November 2021 |work=[[Trinity College Dublin]] |language=en}}</ref><ref>{{cite web |last1=Liu |first1=Haoyu |last2=Patras |first2=Paul |last3=Leith |first3=Douglas J. |title=Android Mobile OS Snooping By Samsung, Xiaomi, Huawei and Realme Handsets |date=6 October 2021 |url=https://www.scss.tcd.ie/Doug.Leith/Android_privacy_report.pdf |access-date=16 November 2021}}</ref> Guidelines for mobile device security were issued by NIST<ref>{{cite tech report|url=https://www.nist.gov/publications/guidelines-managing-security-mobile-devices-enterprise|title=Guidelines for Managing the Security of Mobile Devices in the Enterprise|date=June 21, 2013|first1=Murugiah P.|last1=Souppaya|first2=Karen A.|last2=Scarfone|series=Special Publication (NIST SP)|id=800-124 Rev 1|doi=10.6028/NIST.SP.800-124r1|publisher=[[National Institute of Standards and Technology]]|doi-access=free}}</ref> and many other organizations. For conducting a private, in-person meeting, at least one site recommends that the user switch the smartphone off and disconnect the battery.<ref>{{cite web|url=https://securityinabox.org/en/guide/smartphones/|title=Use Your Smartphone As Securely As Possible|website=Security in-a-box}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)