Download PDFOpen PDF in browserMobile Devices Vulnerabilities10 pages•Published: March 18, 2022AbstractWith the increase in popularity of mobile devices for personal and business reasons, they have become even more attractive targets to malicious actors. There are many vulnerabilities with any mobile device, though some environments, features, and operating systems are at higher risk than others for certain attacks. This paper discusses such vulnerabilities, including the elements that allow them, methods of exploiting them, and one might combat attacks on mobile devices.Keyphrases: apps, cryptomining, keyloggers, madware, malware, trojan In: Bidyut Gupta, Ajay Bandi and Mohammad Hossain (editors). Proceedings of 37th International Conference on Computers and Their Applications, vol 82, pages 92-101.
|