DeepAI AI Chat
Log In Sign Up

Mobile Security for the modern CEO: Attacks, Mitigations, and Future Trends

07/17/2022
by   Marc Schmitt, et al.
0

Todays world is digital, global, and interconnected and mobile devices are at the heart of modern communications in business, politics, and civil society. However, cyber threats are an omnipresent reality in our hyper-connected world. The world economic forum ranks cyber threats consistently among the global top security risks. Attacks on mobile devices grow yearly in volume and magnitude causing severe damage. This paper offers a comprehensive overview of modern mobile attacks categorized into malware, phishing, communication, supply chain, physical, and authentication attacks, including a section on mitigations and limitations. It also provides security design tips to secure the mobile setup and general recommendations to prevent the successful execution of an incoming attack. The last section highlights future technology trends and how those will impact and change the mobile security landscape in the future.

READ FULL TEXT

page 1

page 2

page 3

page 4

03/27/2018

Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues

This paper presents a comprehensive investigation of authentication sche...
04/24/2019

Security Analysis of Near-Field Communication (NFC) Payments

Near-Field Communication (NFC) is a modern technology for short range co...
08/06/2018

Digital Blues: An Investigation into the Use of Bluetooth Protocols

The proliferation of Bluetooth mobile device communications into all asp...
05/10/2021

Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Survey

Today's mobile devices contain densely packaged system-on-chips (SoCs) w...
07/29/2018

Mobile Technology in Healthcare Environment: Security Vulnerabilities and Countermeasures

Mobile devices and technologies offer a tremendous amount of benefits to...
11/16/2022

Nano-Resolution Visual Identifiers Enable Secure Monitoring in Next-Generation Cyber-Physical Systems

Today's supply chains heavily rely on cyber-physical systems such as int...
07/17/2022

Review of Peer-to-Peer Botnets and Detection Mechanisms

Cybercrimes are becoming a bigger menace to both people and corporations...