Mobile security, or more specifically the security of mobile devices, has become increasingly important in mobile computing. Of particular concern is the security of personal and business information now stored in smartphones.
More and more users and companies use smartphones to communicate, but also to plan and organize the work of their users and also private life. Within companies, these technologies are causing profound changes in the organization of information systems and, therefore, have become the source of new risks. In fact, smartphones collect and compile an increasing amount of confidential information to which access must be controlled to protect the privacy of the user and the intellectual property of the company.
All smartphones, like computers, are preferred targets of attacks. These attacks exploit the weaknesses inherent in smartphones that can come from the communication mode, such as the Short Message Service (SMS, also called text message), the Multimedia Message Service (MMS), WiFi, Bluetooth and GSM, the de facto global standard for mobile communications. There are also exploits that attack software vulnerabilities in the browser or the operating system. And some malicious programs are based on the weak knowledge of an average user.
Security countermeasures are being developed and applied to smartphones, from security in different software layers to dissemination of information to end users. There are good practices that must be observed at all levels, from design to use, to the development of operating systems, software layers and downloadable applications.