These days, more and more people have started using smartphones for fulfilling various communication and other requirements. As per the market forecast, by 2013 people will be more dependent on smartphones as compared to their PC or laptop. Since you can easily access the internet with the help of a smartphone, this device is becoming more popular among masses.
However, there are few security risks involved while using mobile phones. In the following paragraphs, these risks have been mentioned in brief.
-
The data may leak in case of theft or loss –
The risk of getting your data leaked is very high if you lose your smartphone. People who posses your smartphone can access your memory and can misuse it against you in future.
-
Unintentional disclosure of data –
Users of a smartphone may disclose certain important personal data unintentionally and this risk is also quite high.
-
A decommissioned smartphone may be attacked –
This risk is also in a high category where any unauthorized person may access the information available on your smartphone if it is not properly decommissioned or disposed of.
-
Phishing attacks –
This risk, however, falls in the medium category, but it can be really a serious one too. The attacker can easily collect various secret passwords or your credit card number with the help of fake email or SMS, which may appear to be quite genuine to you.
-
Spyware attacks –
Attackers may access your various personal data with the help of spyware installed on your smartphone. This risk is of medium category.
-
Network Spoofing Attacks –
Here too any attacker can use a various network to access your data and use against you.
-
Surveillance attacks –
An attacker may keep any specific user under surveillance through the target user’s smartphone.
-
Diallerware attacks –
In this attack, any unauthorized person may steal your money with the help of malware.
-
Financial malware attacks –
If any malware infects your smartphone then an unauthorized person may steal your credit card number and other banking information and carry out unauthorized e-commerce transaction.
-
Network congestion –
The network may be overloaded due to excessive usage.