Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks to which they connect, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless security.
The safety of mobile devices has become increasingly important in recent years as the number of devices in operation and the uses to which they are put have expanded dramatically. The problem is compounded within the company as the continuing trend towards the consumerization of IT is leading to more and more employee owned devices that connect to the corporate network.
Mobile security or mobile phone security has become increasingly important in mobile computing. Of particular concern is the security of personal and business information now stored on smartphones. More and more users and companies use smartphones to communicate, but also to plan and organize the work of their users and also private life. Within companies, these technologies are causing profound changes in the organization of information systems and therefore have become the source of new risks. In fact, smartphones collect and compile an increasing amount of sensitive information that should be controlled access to protect the privacy of the user and the intellectual property of the company.
All smartphones, such as computers, are the preferred targets of the attacks. These attacks exploit the weaknesses inherent in smartphones that can come from the communication mode, such as short message service (SMS, also known as text messaging), multimedia messaging service (MMS), Wi-Fi, Bluetooth and GSM. There are also exploits that target software vulnerabilities in the browser or operating system. And some malicious software is based on the weak knowledge of an average user. According to a McAfee finding in 2008, 11.6% of users had heard of another person affected by mobile malware, but only 2.1% had personal experience with that problem. However, this number is expected to grow.
Security countermeasures are being developed and applied to smartphones, from security in different layers of software to the dissemination of information to end users. There are good practices that must be observed at all levels, from design to use, through the development of operating systems, software layers and downloadable applications.