Return to search

Mobile Phone and Infrastructure Vulnerabilities

The first mobile threat that appeared in the year 2004, that is Cabir.A has shown that mobile phone threat is a proof-of -concept application. However, most Symbian malwares are still quite primitive and not in the form of executable code. It is able to replicate itself via Bluetooth devices supporting Symbian Series 60 user interface platform. To date (October 2007), Cabir.A has been widespread over many countries such as Malaysia, United States, United Kingdom, Italy, Russia, Indonesia, Japan, Singapore, Australia and New Zealand.The current target for mobile phone attacks has a certain focus on the Symbian Series 60 user interface platform mainly because of its increasing market share. The vulnerabilities of the years 2005 and 2006 have included more than 120 types of variants and new virus attacks has been using Cabir variants as a basis to create more dangerous and damageable malware.At the beginning of 2005 the main types of mobile malware had matured and were used by virus writers over the next eighteen months, including the following:1. Worms that spread via Smartphone protocols and services2. Vandal Trojans that install themselves in the system by exploiting Symbian design faults3. Trojans designed for financial gainThere are only a few main types of behavior but in practice mobile malware comes in a multitude of forms. / Uppsatsnivå: D

Identiferoai:union.ndltd.org:UPSALLA1/oai:DiVA.org:hb-18680
Date January 2007
CreatorsKannan, Prasanna, Krasniqi, Nesret
PublisherHögskolan i Borås, Institutionen Ingenjörshögskolan, Högskolan i Borås, Institutionen Ingenjörshögskolan, University of Borås/School of Engineering
Source SetsDiVA Archive at Upsalla University
LanguageEnglish
Detected LanguageEnglish
TypeStudent thesis, info:eu-repo/semantics/bachelorThesis, text
Formatapplication/pdf
Rightsinfo:eu-repo/semantics/openAccess
RelationMagisteruppsats,

Page generated in 0.0025 seconds