2013
DOI: 10.1016/j.protcy.2013.12.241
|View full text |Cite
|
Sign up to set email alerts
|

Reviews on Cybercrime Affecting Portable Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
7
1
1
1

Relationship

1
9

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…In practice, hackers most commonly attract their victims by downloading useful applications and popular video games to which they attach the malware source before releasing them into the market. When the users install these on their mobile devices, they unwittingly introduce malware to the system (Safavi, Shukur et al 2013). In 2010, Costin, Raiu, and Kaspersky reported that they discovered TrojanSMS-the first Trojan working with the Android operating system.…”
Section: Android's Vulnerabilitiesmentioning
confidence: 99%
“…In practice, hackers most commonly attract their victims by downloading useful applications and popular video games to which they attach the malware source before releasing them into the market. When the users install these on their mobile devices, they unwittingly introduce malware to the system (Safavi, Shukur et al 2013). In 2010, Costin, Raiu, and Kaspersky reported that they discovered TrojanSMS-the first Trojan working with the Android operating system.…”
Section: Android's Vulnerabilitiesmentioning
confidence: 99%
“…The underlying blockchain protocol is secure and stable, to a great extent owing to the way that any malicious actor(s) endeavoring to modify (i.e., "attack and change," generally said to be as 51% attack) the chain would need to control a larger part of the computing power related with the blockchain [32,33].…”
Section: The Proposed Platformmentioning
confidence: 99%
“…The study, titled reviews on Cybercrime Affecting Portable Devices by safavi et al [11]. This study aims to determine begaimana security for data probadi available on mobile devices android smartphone operating system from cyber attacks such as data theft and phishing.…”
Section: Current Researchmentioning
confidence: 99%