Mobile Virus full report
#1

[attachment=1771]
[attachment=1772]

A Report On The Topic MOBILE VIRUS AND WORMS
Submitted To : By
Sonali Madam Kotadia Aswani
Bhawik Bhavesh ECE ËœAâ„¢
Introduction
All of us are familiar with cell phones. The use of cell phones to access internet and share executable files have increased. With the growing number of functionalities, the amount of personal data at risk is high. With the growth of the smart phone, mobile phones with Internet connectivity that work like a handheld computer, phone users have also seen the advent of the mobile phone virus. If not handled properly, it may prove to be fatal to our privacy. It is not just PCs that are vulnerable to virus attacks these days--now we also have to protect your phone from mobile phone virus and PDA, too. Advanced mobile phones run the same kind of applications as desktop and laptop computers, and they have multiple wireless connections so they too get infected by mobile phone virus and spread cell phone virus.
There are currently about 100 mobile viruses that can disable a phone or create bills of hundreds of dollars by sending pricey picture messages. The first mobile virus spreading "in the wild" emerged less than two years ago. While this is still a tiny number compared with personal computer viruses, the threat is expected to increase.
Virus, What is it
A virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. It may have a negative effect, such as causing a program to operate incorrectly or corrupting a computer's memory. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it
over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer. A worm is one that exploit security vulnerabilities to spread it to other computers without needing to be transferred as part of a host, and a Trojan horse is a program that appears harmless but has a hidden agenda. Worms and Trojans, like viruses, may cause harm to either a computer system's hosted data, functional performance, or networking throughput, when they are executed. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious.
MOBILE VIRUS
A mobile virus is an electronic virus that targets mobile phones or wireless-enabled PDAs. As wireless phone and PDA networks become more numerous and more complex, it has become more difficult to secure them against electronic attacks in the form of viruses or other malicious software (also known as malware). Malware is software designed to infiltrate or damage a computer system without the owner's informed consent. A mobile phone virus is a computer virus specifically adapted for the cellular environment and designed to spread from one vulnerable phone to another. Although mobile phone virus hoaxes have been around for years, the so-called Cabir virus is the first verified example.
Motive to create virus
Viruses are written for a variety of reasons
¢ Curiosity ¢ Challenge ¢ To gain wider attention ¢ Some new antivirus companies want to enter new market.
Differences with PC Virus
Although similar OSes are being used, differences exist: Large numbers of mobile users are less tech literate. Implies that it is difficult to rollout security patches to phones already sold. Mobiles are always connected and switched on. Environment keeps changing as the user keep changing its mode of using cell phones.
Cell phones also have OS Symbian OS Windows Mobile Palm OS J2ME Linux based Blackberry based
Virus Actions
¢ Send SMS & MMS to all numbers found within mobile phone. ¢ Damage by deleting & modifying mobile phone.
¢ Starting to make calls to pay-per-minute numbers. ¢ Prevents phone from booting. ¢ Drains phone™s battery.
Case Studies
First symbian virus: CARIBE
In 2004 a group of professional virus writers known as 29A created the first virus for smartphones called Caribe. Caribe is the first network worm capable of spreading via Bluetooth. It infects mobile phones which run Symbian OS. Creators stated it was purely proof of concept just to show malicious code could be created for Symbian OS. Source code was published on the Internet many modified version surfaced.
Most dangerous Symbian virus: COMWAR
The second worm found for mobile devices was the Comwar. The worm spread via Bluetooth and MMS. The executable worm file is packed into a Symbian archive (*.SIS). Once launched the worm will search for accessible Bluetooth devices and send the infected .SIS archive under a random name to these devices.
The Skuller Trojan
Skuller was the first real Trojan for the Symbian OS. The Trojan appeared as a program which would offer new wallpapers and icons for Symbian OS. Installing the program led to the standard application icons to be replaced with a skull and crossbones. At the same time it would overwrite the original application application ceased to work. Once the smartphone has been infected it caonly be used to make calls.
How skuller works
Classification (examples)
Futuristic Developments
Location Tracking Camera and Microphone Bug Leaking Sensitive Information DDOS attack on Mobile Service Provider
Common protection against mobile malware
1) Non-discoverable Bluetooth - Switch to Bluetooth hidden mode. If your phone has Bluetooth capability, ensure that the Bluetooth capability is switched to hidden or invisible mode unless you specifically need it to be visible. This will help prevent other Bluetooth-enabled devices from finding your phone (unless you grant them the necessary permission) and will therefore help protect your phone from worms that spread using the Bluetooth wireless technology. 2) Install antivirus 3) Firmware Updates. 4) Donâ„¢t use untrusted sites & softwares. 5) Infection Scanners at public locations.
What is Antivirus
Antivirus software are computer programs that attempt to identify, neutralize or eliminate malicious software. Antivirus mainly prevents and removes computer viruses, including worms and trojan horses.
CONCLUSION
We should not accept files from unknown people without confirmation. We should not download unknown files from internet. Since the advent of the Internet, computer virus hoaxes have competed with computer viruses. The same is true of the mobile phone virus. There are real hoaxes, just as there are real viruses. One recent one had folks believing that calls from Pakistan to Afghanistan would transmit an actual physical virus that could cause users to become sick. Mainly, we simply need to be worried about the

viruses that might make our mobile phone sick. Installing antivirus programs makes good sense, especially if we want to keep our smart phones healthy. There are so many antivirus applications for PocketPC, Symbian Series 60, Windows Mobile are already available in market.
REFERENCES
¢ viruslist.com
¢
mobile.f-secure.com
¢ free-av.com ¢ zdnet.com.au
¢
scribd.com

¢ physorg.com
¢ ¢
hoax-slayermobile-phone-virus-hoax.html wisegeek.com
¢ Operating system principles
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: best virus protection, sumantra, who is moses mother, stop hotmail sending virus emails, bluetooth worm virus, anti virus software, 3d wallpapers,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
Mobile Virus full report - by project report tiger - 06-02-2010, 05:33 PM
RE: Mobile Virus full report - by projectsofme - 15-10-2010, 04:54 PM
RE: Mobile Virus full report - by projectsofme - 21-12-2010, 03:33 PM
RE: Mobile Virus full report - by seminar class - 10-03-2011, 12:52 PM
RE: Mobile Virus full report - by seminar addict - 09-02-2012, 10:25 AM
RE: Mobile Virus full report - by stefani88 - 09-02-2012, 02:02 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  Transparent electronics full report seminar surveyer 8 25,216 04-04-2018, 07:54 AM
Last Post: Kalyani Wadkar
  wireless charging through microwaves full report project report tiger 90 72,006 27-09-2016, 04:16 AM
Last Post: The icon
  Wireless Power Transmission via Solar Power Satellite full report project topics 32 51,090 30-03-2016, 03:27 PM
Last Post: dhanabhagya
  surge current protection using superconductors full report computer science technology 13 27,447 16-03-2016, 12:03 AM
Last Post: computer science crazy
  paper battery full report project report tiger 57 62,692 16-02-2016, 11:42 AM
Last Post: Guest
  IMOD-Interferometric modulator full report seminar presentation 3 11,733 18-07-2015, 10:14 AM
Last Post: [email protected]
  Home appliance & pc Cursor control by mobile phone (DTMF) smart paper boy 3 3,617 21-05-2015, 03:16 PM
Last Post: seminar report asees
  digital jewellery full report project report tiger 36 67,371 27-04-2015, 01:29 PM
Last Post: seminar report asees
  LOW POWER VLSI On CMOS full report project report tiger 15 22,687 09-12-2014, 06:31 PM
Last Post: seminar report asees
  eddy current brake full report project report tiger 24 34,091 14-09-2014, 08:27 AM
Last Post: Guest

Forum Jump: