Recent Security Issues in Personal Communication System
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
AV-TEST Security Report for 2016/2017
FACTS AND FIGURES SECURITY REPORT The AV-TEST Security Report 2 WINDOWS Security Status 5 macOS Security Status 10 ANDROID Security Status 13 INTERNET THREATS Security Status 16 IoT Security Status 19 2016/17 Test Statistics 22 FACTS AND FIGURES Declining malware statistics It remains positive to note that the declining malware trend in 2016 The AV-TEST provided some relief, at least quantitatively. Thus, compared to 2015, detection systems were required to seek out and defend against 14% fewer Security Report malware samples. In total, this amounted to precisely 11,725,292 fewer newly developed malware programs than in the previous year. It should not be The best news right off the bat: forgotten, however, that the volume of newly developed malware in 2016 still represented the second-highest since the beginning of measurements by Compared to the previous year, the AV-TEST systems. In addition, 2015 saw skyrocketing growth in malware the detection systems of AV-TEST showed programs and in comparison to 2014, practically a doubling of the sample statistics. The overall number of malware programs for all operating systems a slight decline in the development currently exceeds 640 million. of malware programs for the year 2016. Without wanting to belittle the positive trend for 2016, the fact remains that Overall, that is a pleasing trend, however there have been several short-term downward trends since the beginning of by no means any reason to celebrate, measurements in 1984, a total of six times, without seriously influencing the clear, long-term trend – towards more malware. Despite declining numbers, as evidenced by the AV-TEST Institute‘s in 2016, the AV-TEST analysis systems still recorded an average of 350,000 statistics of this year‘s Security Report. -
A Review on Android Malware: Attacks, Countermeasures and Challenges Ahead
A Review on Android Malware: Attacks, Countermeasures and Challenges Ahead ShymalaGowri Selvaganapathy1;∗, Sudha Sadasivam2 and Vinayakumar Ravi3 1Department of Information Technology, PSG College of Technology, Coimbatore, India 2Department of Computer Science and Engineering, PSG College of Technology, Coimbatore, India 3Center for Artificial Intelligence, Prince Mohammad Bin Fahd University, Khobar, Saudi Arabia E-mail: [email protected] ∗Corresponding Author Received 09 September 2020; Accepted 10 December 2020; Publication 11 March 2021 Abstract Smartphones usage have become ubiquitous in modern life serving as a double-edged sword with opportunities and challenges in it. Along with the benefits, smartphones also have high exposure to malware. Malware has progressively penetrated thereby causing more turbulence. Malware authors have become increasingly sophisticated and are able to evade detection by anti-malware engines. This has led to a constant arms race between malware authors and malware defenders. This survey converges on Android malware and covers a walkthrough of the various obfuscation attacks deployed during malware analysis phase along with the myriad of adversarial attacks operated at malware detection phase. The review also unscrambles the difficulties currently faced in deploying an on-device, lightweight malware detector. It sheds spotlight for researchers to perceive the current state of the art techniques available to fend off malware along with suggestions on possible future directions. Journal of Cyber Security and Mobility, Vol. 10_1, 177–230. doi: 10.13052/jcsm2245-1439.1017 © 2021 River Publishers 178 S. G. Selvaganapathy et al. Keywords: Malware, android, anomaly detection, attacks, defense, adver- sarial attack, evasion attack, obfuscation attack. 1 Introduction The inverse relationship between malware and anti-malware has lead to the coevolution of malware authors and malware defenders for decades. -
Recent Security Issues in Personal Communication System
SCIREA Journal of Computer Science and Technology http://www.scirea.org/journal/Computer October 28, 2016 Volume 1, Issue1, October 2016 RECENT SECURITY ISSUES IN PERSONAL COMMUNICATION SYSTEM QI ZHU Department of Computer Science, University of Houston-Victoria Abstract Personal Communication System (PCS) designates a set of wireless communications capabilities that allows the combination of terminal mobility, personal mobility, and service profile management. PCS can provide users with an all-in-one wireless phone, paging, messaging, and data service through portable devices. However, mobile services relaxed security has effectively made device users a target for hackers; mobile users have become increasingly concerned with security risks. The need for security has never been more detrimental than it is now. In this paper, we present a survey on emerging security issues of personal communication system, such as virus, worm, phishing and many others. In addition, some real recent examples are studied and finally some security rules are given to PCS users. Keywords: Security, personal communication, virus, worm, phishing, malware 35 Introduction Personal communication systems (PCS) have become a necessary part of human lifestyle. PCS is referred as several types of wireless voice and/or wireless data communications systems, typically incorporating digital technology, and providing services via Smartphones or personal digital assistants (PDAs) to give users mobile access to email, the internet, GPS navigation, and many other applications (Cheng, 2008). Furthermore, PCS can also be used to provide wireless- phone technology that combines a range of features and services surpassing those available in analog- and digital-cellar phone systems, including services which permit users to transmit and receive communications from a device within a WLAN and abroad. -
Virus Hp Android Paling Berbahaya
Virus hp android paling berbahaya Continue Mobile illustration (source: iStockphoto)Liputan6.com, Jakarta Android virus types should be known to you users of this operating system. Not only computers, viruses can also attack Android devices. This type of Android virus is usually similar to a computer virus. This type of android virus will interfere with the operating system even if it damages the device. From promotional and pop-ups to identity theft, there are many problems with sharing this type of Android virus. Although it already has some built-in security, this type of Android virus can be in attack to attack the system. Call it Google Play Protect, which scans all apps in the Play Store to protect your phone from malware. However, there are still many malicious apps with this type of Android virus in them. So you should be aware of this Android virus. Be sure not to carelessly install apps or open foreign links as they are all the source of android viruses. Here are the types of malicious Android viruses Liputan6.com from various sources Friday (11/10/2019). Android Illustration (iStockPhoto)Shedun is the name of a family of mobile viruses focused on Android systems. This type of malware has been found in Androids made in China such as smartphones and tablets. Shedun can automatically eradicate the device, leaving it open to advertising. Shedun is usually packaged as illegal apps through third-party app download sites. This app is usually a clone of common apps such as Facebook, Twitter, WhatsApp, Candy Crush, Google Now, and Snapchat. -
Download Applications from Such Sources
A MALWARE ANALYSIS AND DETECTION SYSTEM FOR MOBILE DEVICES ALI FEIZOLLAH Malaya THESIS SUBMITTED IN FULFILMENTof OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY UNIVERSITY OF MALAYA KUALA LUMPUR University 2017 UNIVERSITY OF MALAYA ORIGINAL LITERARY WORK DECLARATION Name of Candidate: Ali Feizollah Matric No: WHA140017 Name of Degree: Doctor of Philosophy Title of Project Paper/Research Report/Dissertation/Thesis (“this Work”): A Malware Analysis and Detection System for Mobile Devices Field of Study: Network Security, Malware Detection I do solemnly and sincerely declare that: (1) I am the sole author/writer of this Work; (2) This Work is original; (3) Any use of any work in which copyright exists was done by way of fair dealing and for permitted purposes and any excerpt or extract from, or reference to or reproduction of any copyright work has been disclosed expressly and sufficiently and the title of the WorkMalaya and its authorship have been acknowledged in this Work; (4) I do not have any actual knowledge nor do I ought reasonably to know that the making of this work constitutes an infringement of any copyright work; (5) I hereby assign all and every ofrights in the copyright to this Work to the University of Malaya (“UM”), who henceforth shall be owner of the copyright in this Work and that any reproduction or use in any form or by any means whatsoever is prohibited without the written consent of UM having been first had and obtained; (6) I am fully aware that if in the course of making this Work I have infringed any copyright whether intentionally or otherwise, I may be subject to legal action or any other action as may be determined by UM. -
Attacks on the Android Platform Ranajit Singh Mehroke St
St. Cloud State University theRepository at St. Cloud State Culminating Projects in Information Assurance Department of Information Systems 5-2019 Attacks on the Android Platform Ranajit Singh Mehroke St. Cloud State University, [email protected] Follow this and additional works at: https://repository.stcloudstate.edu/msia_etds Recommended Citation Mehroke, Ranajit Singh, "Attacks on the Android Platform" (2019). Culminating Projects in Information Assurance. 82. https://repository.stcloudstate.edu/msia_etds/82 This Starred Paper is brought to you for free and open access by the Department of Information Systems at theRepository at St. Cloud State. It has been accepted for inclusion in Culminating Projects in Information Assurance by an authorized administrator of theRepository at St. Cloud State. For more information, please contact [email protected]. Attacks on the Android Platform by Ranajit Singh Mehroke A Starred Paper Submitted to the Graduate Faculty of St. Cloud State University in Partial Fulfillment of the Requirements for the Degree Master of Science in Information Assurance March, 2019 Starred Paper Committee: Susantha Herath, Chairperson Jim Chen Changsoo Sohn 2 Abstract The focus of this research revolves around Android platform security, specifically Android malware attacks and defensive techniques. Android is a mobile operating system developed by Google, based on the Linux kernel and designed primarily for touchscreen mobile devices such as smartphones and tablets. With the rise of device mobility in our data-driven world, Android constitutes most of the operating systems on these mobile devices playing a dominant role in today’s world. Hence, this paper analyzes attacks and the various defensive mechanisms that have been proposed to prevent those attacks.