mobile security threats
Mobile security threats include both physical and software-based threats that can compromise the data on smartphones, tablets and similar mobile devices. Mobile security threats include everything from mobile forms of malware and spyware to the potential for unauthorized access to a device’s data, particularly in the case of accidental loss or theft of the device.
Mobile malware and spyware security threats can access a device’s private data without a user’s knowledge or consent and can also perform malicious actions without the user knowing, including transferring control of the device to a hacker, sending unsolicited messages to the device’s contacts, making expensive phone calls on smartphones, and more.
Physical Mobile Security Threats and Other Types of Threats
When it comes to physical mobile security threats, phones that lack passwords, screen locks or other forms of authentication are vulnerable to unauthorized access, which can compromise sensitive information stored on the mobile device. And if the device gets lost or stolen, hackers can bypass many forms of authentication in order to gain access to the device’s sensitive information.
Additional types of mobile security threats include applications that take advantage of vulnerabilities in the mobile operating system or a mobile application to gain access and/or control of the device, phishing scams, Web browser and network-based exploits, Wi-Fi packet sniffing for accessing mobile device data in transit, and more.
- Enterprise Mobility Exchange results show continued growth and emphasis on mobility. CIOInsight breaks down the numbers here. »
- Watch Datamation's editor James Maguire moderate roundtable discussions with tech experts from companies such as Accenture, Dell, Blue Jeans Network, Microsoft and more »
From the widest view, everything that we include under the heading of mobile has irrevocably changed IT's relationship with the rest of the... Read More »Choosing an Enterprise Storage Implementation
When you deploy a new enterprise storage system, you must decide whether to design and build your own storage system or to utilize a cloud-based... Read More »Big Data Analytics Expert Predictions
In this Webopedia Did You Know...? article we look at three big data expert predictions for 2014. Read More »
Keeping track of big data trends, research and statistics gives IT professionals a solid foundation to plan big data projects. Here are 15... Read More »Enterprise Storage Vendors
There's a number of vendors that sell enterprise storage hardware or offer cloud-based enterprise storage. View Webopedia's Enterprise storage... Read More »50 Cloud Computing Terms Defined
From planning a private cloud project to finding an online cloud storage provider, Webopedia's A-Z Cloud Computing Glossary will help you... Read More »