CELL PHONE VIRUSES AND SECURITY
#1
Music 

CELL PHONE VIRUSES AND SECURITY

As cell phones become a part and parcel of our life so do the threats imposed to them is also on the increase. Like the internet, today even the cell phones are going online with the technologies like the edge, GPRS etc. This online network of cellphones has exposed them to the high risks caused by malwares viruses, worms and Trojans designed for mobile phone environment. The security threat caused by these malwares are so severe that a time would soon come that the hackers could infect mobile phones with malicious software that will delete any personal data or can run up a victim s phone bill by making toll calls.

All these can lead to overload in mobile networks, which can eventually lead them to crash and then the financial data stealing which poises risk factors for smart phones. As the mobile technology is comparatively new and still on the developing stages compared to that of internet technology, the anti virus companies along with the vendors of phones and mobile operating systems have intensified the research and development activities on this growing threat, with a more serious perspective.
Reply
#2
Thumbs Down 
(01-03-2009, 02:09 PM)stuff Wrote: CELL PHONE VIRUSES AND SECURITY

As cell phones become a part and parcel of our life so do the threats imposed to them is also on the increase. Like the internet, today even the cell phones are going online with the technologies like the edge, GPRS etc. This online network of cellphones has exposed them to the high risks caused by malwares viruses, worms and Trojans designed for mobile phone environment. The security threat caused by these malwares are so severe that a time would soon come that the hackers could infect mobile phones with malicious software that will delete any personal data or can run up a victim s phone bill by making toll calls.

All these can lead to overload in mobile networks, which can eventually lead them to crash and then the financial data stealing which poises risk factors for smart phones. As the mobile technology is comparatively new and still on the developing stages compared to that of internet technology, the anti virus companies along with the vendors of phones and mobile operating systems have intensified the research and development activities on this growing threat, with a more serious perspective.

plz send me all the details related to this topic for seminar presentation(with slides..)plzzzzzzzzzzzzzzz.............
Reply
#3
A mobile phone virus is a computer virus specifically adapted for the cellular environment and designed to spread from one vulnerable phone to another. Although mobile phone virus hoaxes have been around for years, the so-called Cabir virus is the first verified example. The virus was created by a group from the Czech Republic and Slovakia called 29a, who sent it to a number of security software companies, including Symantec in the United States and Kapersky Lab in Russia. Cabir is considered a "proof of concept" virus, because it proves that a virus can be written for mobile phones, something that was once doubted.

Cabir was developed for mobile phones running the Symbian and Series 60 software, and using Bluetooth. The virus searches within Bluetooth's range (about 30 meters) for mobile phones running in discoverable mode and sends itself, disguised as a security file, to any vulnerable devices. The virus only becomes active if the recipient accepts the file and then installs it. Once installed, the virus displays the word "Caribe" on the device's display. Each time an infected phone is turned on, the virus launches itself and scans the area for other devices to send itself to. The scanning process is likely to drain the phone's batteries. Cabir can be thought of as a hybrid virus/worm: its mode of distribution qualifies it as a network worm, but it requires user interaction like a traditional virus.

Cabir is not considered very dangerous, because it doesn't cause actual damage, and because users can prevent infection by simply refusing to accept suspicious files. However, the virus's code could be altered to create more harmful malware that might, for example, delete any information stored on phones it infects, or send out fake messages purporting to be from the phone's owner.

read more http://electronics.howstuffworkscell-phone-virus4.htm
download full seminar topics here
http://dspace.cusat.acdspace/bitstream/1...CURITY.pdf
Reply
#4
plz can u send full report here
Reply
#5
CELL PHONE VIRUSES AND SECURITY
Abstract

Cell phones have become powerful and sophisticated computing devices and are moving toward an always on form of networking. However, such powerful networked computers are also at risk for a new class of malware, including viruses, worms and trojans specifically designed for a mobile environment. This seminar topic covers a taxonomy of attacks against mobile phones that shows known as well as potential attacks. Understanding existing threats against mobile phones helps us better protect our information and prepare for future dangers. Security experts are finding a growing number of viruses, worms, and Trojan horses that target cellular phones. Security researchers attack simulations have shown that before long, hackers could infect mobile phones with malicious software that deletes personal data or runs up a victim\'s phone bill by making toll calls. The attacks could also degrade or overload mobile networks, eventually causing them to crash, financial data stealing, and Risk factors for smart phones. Mobile-device technology is still relatively new, and vendors have not developed mature security approaches. An introduction to security concerns in mobile appliances. To counter the growing threat, antivirus companies have stepped up their research and development. In addition, vendors of phones and mobile operating systems are looking for ways to improve security. Recent innovations and emerging commercial technologies that address these issues are also incorporated in the topic.
Reply
#6
[attachment=12903]
INTRODUCTION
• Phone
– Make calls
– Send texts
– 21st century phone
– More functionality
– More private data
– More internet access
• Grater efficiency
Efficiency of phone
• Gets into the host’s phone via internet or from other phones
• Copies itself inside the phone
• Attaches itself to the files and programs
• Executes itself with out owner’s knowledge
• Needs user authentication
• Current actions
– Make calls to pay per minute numbers
– Accessing and modifying the data
– Prevent phone from booting
– Unwanted booting
– Drains phone’s battery
• Futuristic actions
– Location tracking
– Call tracking
– Leaking sensitive information
Spread Vector
• Web download
• Bluetooth
• MMS
• Memory card
• Computer
• First verified mobile virus
• Developed in 2004 by a group named 29A
• Proof concept of mobile virus
CARIBE
• Functionality
– Platform : symbian 60
– Spread vector : bluetooth
– Tries to send itself to all bluetooth enabled devices
– Installs itself as a.SIS filename
– CARIBE is displayed on infected phone’s display, on rebooting
– Continue bluetooth scanning drains phone’s battery
– Does not spread if the user does not accept the file-transfer
– No real harms
• Current state is harmless
COMMWARRIOR
• Origin : RUSSIA
• Got world wide attention on 2005
• Spread vector : MMS and bluetooth
• Platform : symbian 60 Smartphone
• Sends infected files to phone’s contact
• Fastest spread virus
• Detected by F-Secure Mobile Anti-Virus
SKULLS
• Platform : symbian OS
• Appears as a program to offer new wallpapers and icons
• Replaces all phone icons with images of a skull
• Renders all phone applications
• Infected phone can only make calls
Motives to create virus
• Curiosity
• Challenge
• Gain wider attention
• New antivirus companies
Install antivirus
• A computer program
Conclusion
• We should not accept files from unknown people without confirmation.
• We should not download suspicious files from internet.
• Installing antivirus programs makes good sense, especially if we want to keep our smart phones healthy.
• We simply need to be worried about the viruses that might make our mobile phone sick.
Reply
#7
hello hi..........
can u pls snd me the slides presentations of topic 'Cell Phone Virus and Security'.
Reply
#8
you can refer these page details of "CELL PHONE VIRUSES AND SECURITY"link bellow

http://studentbank.in/report-cell-phone-...d-security

http://studentbank.in/report-cell-phone-...7#pid51207


http://studentbank.in/report-cell-phone-...ity--23573

Reply
#9
i want a complete descruption on cell phone viruses n anti-vireses ....for seminaar ........
Reply
#10
to get information about the topic CELL PHONE VIRUS AND SECURITY full report ,ppt and related topic refer the page link bellow

http://studentbank.in/report-cell-phone-...d-security

http://seminarsprojects.in/attachment.php?aid=14005

http://studentbank.in/report-cell-phone-...ity--23573

http://studentbank.in/report-cell-phone-...ity?page=2

http://studentbank.in/report-cellular-vi...ull-report

http://studentbank.in/report-mobile-viru...5#pid39845

http://studentbank.in/report-mobile-viru...ort?page=2
Reply
#11

Michelle Bell assisted in the discovery of LifeCell Wrinkle Cream herself and saw the results quickly. She hasn’t taken any educational aspect into becoming a doctor or an Esthetician, but knew what all the celebrities were using to make their skin beautiful.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: lottreysanbad for java phone com, computer viruses seminar report, i phone reprt, trojans and viruses ppt, ppt for technical seminar topic of cell phone viruses and security, viruses and worms project download, use of artificial intelligence in viruses,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Home appliance & pc Cursor control by mobile phone (DTMF) smart paper boy 3 3,563 21-05-2015, 03:16 PM
Last Post: seminar report asees
  MICRO CONTROLLER BASED SECURITY SYSTEM USING SONAR ajukrishnan 5 7,153 31-01-2015, 11:55 PM
Last Post: Guest
  advanced mobile phone signal jammer for gsm cdma and 3g networks with prescheduled ti shilpa16 1 1,682 28-10-2013, 12:17 PM
Last Post: ShayneThill
  Android Mobile Security – An Issue of Future computer girl 2 2,394 24-08-2013, 10:26 AM
Last Post: computer topic
  SEMINAR ON INTRODUCTION OF CELL PHONE JAMMERS computer girl 2 4,544 19-04-2013, 10:15 AM
Last Post: Guest
  mobile phone cloning full report project topics 19 32,050 08-02-2013, 09:40 PM
Last Post: Guest
  GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS & SECURITY full report seminar presentation 1 2,735 06-02-2013, 10:02 AM
Last Post: seminar details
  On the channel and signal crosscorrelation uplink and downlink of mobile UHFDTV with seminar class 2 2,054 10-01-2013, 05:30 PM
Last Post: Guest
  embedded systems ppt and Smart Phone full report computer science topics 5 10,366 22-12-2012, 12:03 PM
Last Post: seminar details
  Opportunistic Routing for Wireless Ad Hoc and Sensor Networks: Present and Future seminar presentation 3 3,006 22-11-2012, 01:26 PM
Last Post: seminar details

Forum Jump: