Home / IT Security / Mobile

Mobile

Mobile Device Security Models

The Mobile Device Security Models Android & iOS

Device Security Models: So how have designers built their systems with an eye toward addressing security problems? Several steps have been taken, but overall there has been an attempt to approach the problem of security through five key areas, each addressing a specific problem or need: Access control is used …

Read More »

Goals of Mobile Security

Goals of Mobile Security

Mobile Security: Mobile operating system comes in four flavors: Blackberry, Windows Mobile, Google Android, and Apple iOS. Of these, the Apple iOS and Google Android operating systems are by far the ones most commonly found on modern devices. In order to simplify the examination of mobile operating system and devices …

Read More »

Apple iOS – Security

Apple iOS – Security

Apple iOS: The second most popular mobile operating system in the market is Apple’s iOS, which is present on multiple devices including the iPod, iPad, and iPhone. Much as Android is based on the linux Kernel, iOS is a slimmed-down version of OS X for the Mac. However, while it …

Read More »

Design of Android – Security

Design of Android – Security

Design of Android: Android, under the hood, is a series of components working together to make the system work. Each component in the system is self-contained and focuses on performing whatever task it was designed to do. Each component focuses on security measures for itself and assumes that every other …

Read More »

Google Android OS – Security

Google Android OS – Security

Google Android OS: First, let’s look at the market leader, Android, in our exploration of mobile operating systems. Android took shape way back in 2003 at the hands of Android Inc., which was acquired by Google in 2005. From the beginning, the OS was designed to be mobile platform that …

Read More »

Mobile Security Models and Architectures

Mobile Security Models and Architectures

Mobile OS Models and Architecture: The rapid adoption of the mobile device in the workplace has had two obvious consequences: an increase in productivity and capability as well as a corresponding rise in the number of security risks. The designers of devices have frequently made a tradeoff between security and …

Read More »

Top 10 Mobile Devices Security

Top 10 Mobile Devices Security

Mobile Device Security: Mobile device, such as laptops, tablet computers, and Smartphones, provide security challenges above those of desktops workstations, servers, and such in that they leave the office and this increases the odds of their theft. In 2010, AvMed Health Plans, a Florida-based company, had two laptops computer stolen. …

Read More »

SpyNote Android Trojan Builder Leaked

SpyNote is a Android (APK) which basically which facilitates remote spying. The builder, which creates new versions of the malware, recently leaked on several malware discussion forums. SpyNote is similar to OmniRat and DroidJack, which are RATs (remote administration tools) that allow malware owners to gain remote administrative control of …

Read More »