Cargando…
The current state and future of mobile security in the light of the recent mobile security threat reports
Smartphones have become small computers that meet many of our needs, from e-mail and banking transactions to communication and social media use. In line with these attractive functions, the use of smartphones has greatly increased over the years. One of the most important features of these mobile de...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer US
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9885923/ https://www.ncbi.nlm.nih.gov/pubmed/36743997 http://dx.doi.org/10.1007/s11042-023-14400-6 |
_version_ | 1784880028242149376 |
---|---|
author | Cinar, Ahmet Cevahir Kara, Turkan Beyza |
author_facet | Cinar, Ahmet Cevahir Kara, Turkan Beyza |
author_sort | Cinar, Ahmet Cevahir |
collection | PubMed |
description | Smartphones have become small computers that meet many of our needs, from e-mail and banking transactions to communication and social media use. In line with these attractive functions, the use of smartphones has greatly increased over the years. One of the most important features of these mobile devices is that they offer users many mobile applications that they can install. However, hacker attacks and the spread of malware have also increased. Today, current mobile malware detection and defense technologies are still inadequate. Mobile security is not only directly related to the operating system and used device but also related with communication over the internet, data encryption, data summarization, and users’ privacy awareness. The main aim and contribution of this study are to collect the current state of mobile security and highlight the future of mobile security in light of the recent mobile security threat reports. The studies in the field of malware, attack types, and security vulnerabilities concerning the usage of smartphones were analyzed. The malware detection techniques were analyzed into two categories: signature-based and machine learning (behavior detection)-based techniques. Additionally, the current threats and prevention methods were described. Finally, a future direction is highlighted in the light of the current mobile security reports. |
format | Online Article Text |
id | pubmed-9885923 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | Springer US |
record_format | MEDLINE/PubMed |
spelling | pubmed-98859232023-01-30 The current state and future of mobile security in the light of the recent mobile security threat reports Cinar, Ahmet Cevahir Kara, Turkan Beyza Multimed Tools Appl Article Smartphones have become small computers that meet many of our needs, from e-mail and banking transactions to communication and social media use. In line with these attractive functions, the use of smartphones has greatly increased over the years. One of the most important features of these mobile devices is that they offer users many mobile applications that they can install. However, hacker attacks and the spread of malware have also increased. Today, current mobile malware detection and defense technologies are still inadequate. Mobile security is not only directly related to the operating system and used device but also related with communication over the internet, data encryption, data summarization, and users’ privacy awareness. The main aim and contribution of this study are to collect the current state of mobile security and highlight the future of mobile security in light of the recent mobile security threat reports. The studies in the field of malware, attack types, and security vulnerabilities concerning the usage of smartphones were analyzed. The malware detection techniques were analyzed into two categories: signature-based and machine learning (behavior detection)-based techniques. Additionally, the current threats and prevention methods were described. Finally, a future direction is highlighted in the light of the current mobile security reports. Springer US 2023-01-30 2023 /pmc/articles/PMC9885923/ /pubmed/36743997 http://dx.doi.org/10.1007/s11042-023-14400-6 Text en © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023, Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Article Cinar, Ahmet Cevahir Kara, Turkan Beyza The current state and future of mobile security in the light of the recent mobile security threat reports |
title | The current state and future of mobile security in the light of the recent mobile security threat reports |
title_full | The current state and future of mobile security in the light of the recent mobile security threat reports |
title_fullStr | The current state and future of mobile security in the light of the recent mobile security threat reports |
title_full_unstemmed | The current state and future of mobile security in the light of the recent mobile security threat reports |
title_short | The current state and future of mobile security in the light of the recent mobile security threat reports |
title_sort | current state and future of mobile security in the light of the recent mobile security threat reports |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9885923/ https://www.ncbi.nlm.nih.gov/pubmed/36743997 http://dx.doi.org/10.1007/s11042-023-14400-6 |
work_keys_str_mv | AT cinarahmetcevahir thecurrentstateandfutureofmobilesecurityinthelightoftherecentmobilesecuritythreatreports AT karaturkanbeyza thecurrentstateandfutureofmobilesecurityinthelightoftherecentmobilesecuritythreatreports AT cinarahmetcevahir currentstateandfutureofmobilesecurityinthelightoftherecentmobilesecuritythreatreports AT karaturkanbeyza currentstateandfutureofmobilesecurityinthelightoftherecentmobilesecuritythreatreports |