Mobile Security for the modern CEO: Attacks, Mitigations, and Future Trends

07/17/2022
by   Marc Schmitt, et al.
0

Todays world is digital, global, and interconnected and mobile devices are at the heart of modern communications in business, politics, and civil society. However, cyber threats are an omnipresent reality in our hyper-connected world. The world economic forum ranks cyber threats consistently among the global top security risks. Attacks on mobile devices grow yearly in volume and magnitude causing severe damage. This paper offers a comprehensive overview of modern mobile attacks categorized into malware, phishing, communication, supply chain, physical, and authentication attacks, including a section on mitigations and limitations. It also provides security design tips to secure the mobile setup and general recommendations to prevent the successful execution of an incoming attack. The last section highlights future technology trends and how those will impact and change the mobile security landscape in the future.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/27/2018

Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues

This paper presents a comprehensive investigation of authentication sche...
research
04/24/2019

Security Analysis of Near-Field Communication (NFC) Payments

Near-Field Communication (NFC) is a modern technology for short range co...
research
08/06/2018

Digital Blues: An Investigation into the Use of Bluetooth Protocols

The proliferation of Bluetooth mobile device communications into all asp...
research
05/10/2021

Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Survey

Today's mobile devices contain densely packaged system-on-chips (SoCs) w...
research
08/01/2023

A First Look at Digital Rights Management Systems for Secure Mobile Content Delivery

Digital rights management (DRM) solutions aim to prevent the copying or ...
research
11/16/2022

Nano-Resolution Visual Identifiers Enable Secure Monitoring in Next-Generation Cyber-Physical Systems

Today's supply chains heavily rely on cyber-physical systems such as int...
research
07/17/2022

Review of Peer-to-Peer Botnets and Detection Mechanisms

Cybercrimes are becoming a bigger menace to both people and corporations...

Please sign up or login with your details

Forgot password? Click here to reset