Accès libre

Mobile Security Threats: A Survey on Protection and Mitigation Strategies

À propos de cet article

Citez

[1] Mobile security threats and prevention - https://www.soti.net/media/1590/ebook-mobile-security-threats-and-prevention.pdf Search in Google Scholar

[2] 2018 Mobile Threat Landscape - https://www.trendmicro.com/vinfo/in/security/research-and-analysis/threat-reports/roundup/2018-mobile-threat-landscape Search in Google Scholar

[3] The Spectrum of Mobile Risk - https://www.lookout.com/info/spectrum-of-mobile-risk-report-lp Search in Google Scholar

[4] The growing threat of mobile device security breaches -https://blog.checkpoint.com/wp-content/uploads/2017/04/Dimensional_Enterprise-Mobile-Security-Survey.pdf Search in Google Scholar

[5] Follow the Data: Dissecting Data Breaches and Debunking the Myths -https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/follow-the-data Search in Google Scholar

[6] Billions of Bluetooth devices vulnerable to MITM attacks; no user action -https://www.scmagazineuk.com/billions-bluetooth-devices-vulnerable-mitm-attacks-no-user-action/article/1474116 Search in Google Scholar

[7] New Approach Secure Mobile Banking Apps -https://www.arxan.com/resources/downloads/new-approach-secure-mobile-banking Search in Google Scholar

[8] N. Jeyanthi and R. Thandeeswaran, Eds., “Security Breaches and Threat Prevention in the Internet of Things,” Advances in Information Security, Privacy, and Ethics, 2017.10.4018/978-1-5225-2296-6 Search in Google Scholar

[9] „Fortinet Threat Landscape Report,” Computer Fraud & Security, vol. 2018, no. 6, p. 4, Jun. 2018. Search in Google Scholar