Mobile security has grown in importance in mobile computing. It is especially concerning in terms of the security of personal information now stored on smartphones.
Mobile applications may copy user data from these devices to a remote server without the users’ permission or consent.
The cloud-created user profiles for smartphone users raise privacy concerns across all major platforms, including, but not limited to, location tracking and personal data collection, regardless of user settings on the device.
Smartphones are increasingly being used by users and businesses to plan and organize their work and personal lives.
These technologies are causing profound changes in the organization of information systems within businesses, and as a result, they have become a source of new risks.
Indeed, smartphones collect and compile an increasing amount of sensitive information, to which access must be controlled in order to protect the user’s privacy and the company’s intellectual property.
All smartphones are prime targets for cybercriminals. These attacks take advantage of vulnerabilities in smartphones that can be obtained through wireless communication methods such as WiFi networks and GSM.
There are also attacks that take advantage of software flaws in both the web browser and the operating system.
The lines that separate these categories are sometimes hazy. The OQO UMPC, for example, is also a PDA-sized tablet PC; the Apple eMate had a clamshell form factor but ran PDA software.
The HP Omnibook laptop line included some devices small enough to be referred to as ultra mobile PCs. The Nokia 770 internet tablet’s hardware is essentially the same as that of a PDA, such as the Zaurus 6000; the only reason it isn’t called a PDA is that it lacks PIM software.
Both the 770 and the Zaurus, on the other hand, can run some desktop Linux software, usually with modifications.