Mobilehacking
Mobilehacking
The mobile device has become an inseparable a part of life today. The attackers
are easily ready to compromise the mobile network due to various vulnerabilities,
the bulk of the attacks are due to the untrusted apps. SMS is differently the
attackers are gaining access to the mobile devices by sending phishing
messages/spam messages to users.
Introduction of Mobile Hacking
Mobile Attack Vector
There are several sorts of threats and attacks on a mobile device. a number of most
elementary threats are malware, data loss, and attack on integrity. An attacker may plan to
launch attacks through victim's browser by a malicious website. Social engineering attacks,
data loss, data theft are the common attacks on mobile technology. Mobile attack vector
includes:
Malware
Data Loss
Data Tampering
Data Exfiltration
Mobile Platform Vulnerabilities and Risks
Malicious Apps in Store
Mobile Malware
App Sandboxing vulnerabilities
Weak Device and App Encryption
OS and App Updates Issues
Jailbreaking and Rooting
Mobile Applications Vulnerabilities
Privacy Issues (Geolocation)
Weak Data Security
Excessive Permissions
Weak Communications Security
Physical Attacks
Security Issues Arising from APP Stores
Insufficient apps leads to malicious and fake apps entering appmarketplace
App Store are common target for attackers to distribute malware and malicious apps
Attackers can also social engineer users to download and run apps outside the official app
stores
Malicious apps can damages other applications and data, and send your sensitive data to
attackers
Mobile spam