SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Mobile viruses and security


            -Priyanka Rathod
                       MOBILE VIRUSES AND
                       SECURITY             1
What is the common communication
 medium among us?????????




                 MOBILE VIRUSES AND SECURITY   2
A cell phone
MOBILE VIRUSES AND SECURITY   3
MOBILE VIRUSES AND SECURITY




Cell phone viruses and security.

                                         4
 The  technology of cell phones.
 Viruses
 How cell phone viruses work.
 Difference with pc virus.
 Different types of cell phone viruses.
 Threats.
 Security issue.


                    MOBILE VIRUSES AND SECURITY   5
(.)Analog network.

(.)Digital network.



   MOBILE VIRUSES AND SECURITY   6
 Today  all provider has switched to
 digital network and only a few of them
 are still running analog network.




                   MOBILE VIRUSES AND SECURITY   7
 FDMA(Frequency   division multiple
  access).
 CDMA(Code-division multiple access.
 TDMA(Time division multiple access).
 GSM(Global system for mobile
  communication).


                   MOBILE VIRUSES AND SECURITY   8
 Cell phone virus are electronic
  programs that attacks the cell phones
  PDA (personal digital assistant)
  devices and malfunction s/w that are
  running cell phones.
How they spread?
 Internet download.
 Bluetooth wireless connection.
 Multimedia messaging service.



                   MOBILE VIRUSES AND SECURITY   9
 Unnecessary     call/sms/mms.
 Send private information.
 Cause phone to work slowly.
 Wipe out contact book and other
  information.
 Installs “false” application




                   MOBILE VIRUSES AND SECURITY   10
 Although similar oses are being used
  differences exits:
 Lesser user of cell phones are “tech
  literate”
 Implies that it is difficult to “rollout
  security patches” to phones already sold.
 Cell phones are always connected and
  “switched on”
 “Environment” keeps changing


                      MOBILE VIRUSES AND SECURITY   11
 On
   positive side:
   A malware for 1 type of phone may
    not necessarily be able to infect
    other.
Cellphone malware not yet causing
 severe harm:
    At most they increases users billing
    Cause the cell phone to stop
    working

                    MOBILE VIRUSES AND SECURITY   12
 Timifonica
 Cabir
 Commwarrior
 Comwar
 Duts
 Skulls
 Lasco.a


                MOBILE VIRUSES AND SECURITY   13
 Firstcell phone worm.
 Spread vector-Bluetooth.
• Infected file-cabre.sis
 15 new variants exits.




                   MOBILE VIRUSES AND SECURITY   14
 Location tracking
 Camera and microphone bug
 Leaking sensitive information
 Attack on cell phone service provider.




                    MOBILE VIRUSES AND SECURITY   15
The generic security issues…




           MOBILE VIRUSES AND SECURITY   16
 The  best way to protect phones from
  cell viruses is the same way you
  protect your PCs from computer
  viruses.
 Never open anything if you don’t
  know what it is…..



                    MOBILE VIRUSES AND SECURITY   17
 Turnoff Bluetooth discoverable mode
 Keep your cell phone in hidden mode.




                   MOBILE VIRUSES AND SECURITY   18
   WWW.GOOGLE.COM

   WWW.WEKIPEDIA.COM




                        MOBILE VIRUSES AND SECURITY   19
MOBILE VIRUSES AND
SECURITY             20

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Phishing simulation exercises
Phishing simulation exercisesPhishing simulation exercises
Phishing simulation exercises
 
Mobile security
Mobile securityMobile security
Mobile security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Mobile security
Mobile securityMobile security
Mobile security
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Android Hacking
Android HackingAndroid Hacking
Android Hacking
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 

Andere mochten auch

Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
manish kumar
 
Mobile security
Mobile securityMobile security
Mobile security
home
 
Health and safety ICT
Health and safety ICT Health and safety ICT
Health and safety ICT
Leahdabitch
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around us
lichuyuliting
 
Lab 5--Cybersquatting
Lab 5--CybersquattingLab 5--Cybersquatting
Lab 5--Cybersquatting
aah3420
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
Kevin Lee
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer ppt
Ishan Khan
 
Cybersquatting
CybersquattingCybersquatting
Cybersquatting
bobbyb85
 

Andere mochten auch (20)

Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
SEMINAR
SEMINARSEMINAR
SEMINAR
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Him
HimHim
Him
 
Health and safety ICT
Health and safety ICT Health and safety ICT
Health and safety ICT
 
Nram presentation 3
Nram presentation 3Nram presentation 3
Nram presentation 3
 
Mind Reading Computer
Mind Reading ComputerMind Reading Computer
Mind Reading Computer
 
Health & safety presentation
Health & safety presentationHealth & safety presentation
Health & safety presentation
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around us
 
Lab 5--Cybersquatting
Lab 5--CybersquattingLab 5--Cybersquatting
Lab 5--Cybersquatting
 
ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer ppt
 
Cybersquatting in India - Genesis & Legal Scenario
Cybersquatting in India - Genesis & Legal ScenarioCybersquatting in India - Genesis & Legal Scenario
Cybersquatting in India - Genesis & Legal Scenario
 
Cybersquatting
CybersquattingCybersquatting
Cybersquatting
 
Mind reading computer report
Mind reading computer reportMind reading computer report
Mind reading computer report
 
Mobile Cyber Security
Mobile Cyber SecurityMobile Cyber Security
Mobile Cyber Security
 

Ähnlich wie cell phone viruses and security

10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware
SytelReplyUK
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
Ali J
 
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxmobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
vrandmandora1
 

Ähnlich wie cell phone viruses and security (20)

Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile network
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Cp3201 mobile security final
Cp3201 mobile security finalCp3201 mobile security final
Cp3201 mobile security final
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Top 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOSTop 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOS
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
MOBILE SECURITY.pptx
MOBILE SECURITY.pptxMOBILE SECURITY.pptx
MOBILE SECURITY.pptx
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
VIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptxVIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptx
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
 
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxmobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 

Kürzlich hochgeladen

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 

cell phone viruses and security

  • 1. Mobile viruses and security -Priyanka Rathod MOBILE VIRUSES AND SECURITY 1
  • 2. What is the common communication medium among us????????? MOBILE VIRUSES AND SECURITY 2
  • 3. A cell phone MOBILE VIRUSES AND SECURITY 3
  • 4. MOBILE VIRUSES AND SECURITY Cell phone viruses and security. 4
  • 5.  The technology of cell phones.  Viruses  How cell phone viruses work.  Difference with pc virus.  Different types of cell phone viruses.  Threats.  Security issue. MOBILE VIRUSES AND SECURITY 5
  • 6. (.)Analog network. (.)Digital network. MOBILE VIRUSES AND SECURITY 6
  • 7.  Today all provider has switched to digital network and only a few of them are still running analog network. MOBILE VIRUSES AND SECURITY 7
  • 8.  FDMA(Frequency division multiple access).  CDMA(Code-division multiple access.  TDMA(Time division multiple access).  GSM(Global system for mobile communication). MOBILE VIRUSES AND SECURITY 8
  • 9.  Cell phone virus are electronic programs that attacks the cell phones PDA (personal digital assistant) devices and malfunction s/w that are running cell phones. How they spread?  Internet download.  Bluetooth wireless connection.  Multimedia messaging service. MOBILE VIRUSES AND SECURITY 9
  • 10.  Unnecessary call/sms/mms.  Send private information.  Cause phone to work slowly.  Wipe out contact book and other information.  Installs “false” application MOBILE VIRUSES AND SECURITY 10
  • 11.  Although similar oses are being used differences exits:  Lesser user of cell phones are “tech literate”  Implies that it is difficult to “rollout security patches” to phones already sold.  Cell phones are always connected and “switched on”  “Environment” keeps changing MOBILE VIRUSES AND SECURITY 11
  • 12.  On positive side: A malware for 1 type of phone may not necessarily be able to infect other. Cellphone malware not yet causing severe harm:  At most they increases users billing  Cause the cell phone to stop working MOBILE VIRUSES AND SECURITY 12
  • 13.  Timifonica  Cabir  Commwarrior  Comwar  Duts  Skulls  Lasco.a MOBILE VIRUSES AND SECURITY 13
  • 14.  Firstcell phone worm.  Spread vector-Bluetooth. • Infected file-cabre.sis  15 new variants exits. MOBILE VIRUSES AND SECURITY 14
  • 15.  Location tracking  Camera and microphone bug  Leaking sensitive information  Attack on cell phone service provider. MOBILE VIRUSES AND SECURITY 15
  • 16. The generic security issues… MOBILE VIRUSES AND SECURITY 16
  • 17.  The best way to protect phones from cell viruses is the same way you protect your PCs from computer viruses.  Never open anything if you don’t know what it is….. MOBILE VIRUSES AND SECURITY 17
  • 18.  Turnoff Bluetooth discoverable mode  Keep your cell phone in hidden mode. MOBILE VIRUSES AND SECURITY 18
  • 19. WWW.GOOGLE.COM  WWW.WEKIPEDIA.COM MOBILE VIRUSES AND SECURITY 19