2. 1. A smartphone is a mobile phone with
highly advanced feature and fully
customize.
Connectivity (Wi-Fi, Bluetooth )
Works as Personal Computer
Advance operating system
3. Three Major Operating System used in Smartphone –
A. Android Operating System
Developed by Android , Inc.
Google bought android in 2005
Use Linux Kernel , java and Freeware
4. B. iOS ( iPhone Operation System ) –
Created and Developed by Apple , Inc.
Based on OSX , A Variant of BSD Unix Kernel
Paid OS
5. C. Windows Operating System –
Created and Developed by Microsoft
First Launch in Oct 2010
Paid OS
6. 2.1 Interesting Facts about smartphone –
Mobile Phone Users are increased day by day
Security Risk Associate with Mobile phone also increase
Now a day users moving toward feature phone to
smartphone.
16. Mobile phone industry is the fastest
growing industry in the world.
70% of mobile phones are manufactured
in China.
Around 80% of the world’s population has
a mobile phone.
17. 74 % of smartphone users use their mobile
phone to help with shopping
69% of Smartphone users use their mobile
phone to making a purchase.
49% Mobile phone users mostly spend their
time on games
18. 99% of all mobile malware is targeted at
Android users.
Spy software found Preinstall on Lenovo ,
Huawei and Xiaomi smartphone (F-secure)
India Air Force suggests to it’s employes
not to use Xiaomi Smartphone.
19. Attacker can performed different task by
hacked a User Smartphone
Listening the telephone conversation
Access the internet
View and copy contacts
22. Listening into the chat via messaging
services ( Whatsapp ,Facebook and
Google+)
Reading browser history
Stolen your personal information
23. In Today world there the uses for
smartphone are increase so risk associated
with smartphone also increase day by day
So there are major security risk or threats
and their prevention are also discuss in
this presentation.
24. Attack
This is physical attack.
Hacker can access or misuses your secrete
data physically
Can wipe your important information
25. Defense
Protect your smartphone by anti-theft
protection.
Use Disk Encryption to protect your data.
Always use lock screen feature by good
Password
26. Attack
Creating a Fake page that look like original
page and grab the information enter by
user.
Sending the link via text/email etc.
User think it’s a real website page.
32. Attack
2. Attacker send spam Mail or SMS to users .
About Card block or Suspicious activity.
User call to number that is given in mail/sms
The number look like real phone banking
number.
36. Defense
Make a Call Only Authorize phone banking
number of that bank.
Never share your card detail like (CVV , Exp.
Date , OTP & Pin ) to anyone.
Bank Never call to it’s users for card details.
37. Attack
Attacker build Malicious app that look like
Real app.
This App can work as –
Trojan horse (Banking or Other )
Spyware