Abstract
With the increase in popularity of mobile devices for personal and business reasons, they have become even more attractive targets to malicious actors. There are many vulnerabilities with any mobile device, though some environments, features, and operating systems are at higher risk than others for certain attacks. This paper discusses such vulnerabilities, including the elements that allow them, methods of exploiting them, and one might combat attacks on mobile devices.
Cite
CITATION STYLE
Schneider, M. M., Chowdhury, M., & Latif, S. (2022). Mobile devices vulnerabilities. In EPiC Series in Computing (Vol. 82, pp. 92–101). EasyChair. https://doi.org/10.29007/kg5j
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.