Verified Document

Smart Phone Technology Has Been Continually Innovating. Research Paper

¶ … smart phone technology has been continually innovating. This is because many of the applications are more user-friendly and can offer everyone something that is of interest to them. At the heart of these changes, is the battle that is occurring between Google and Apple. In case of the Google Android, there are more free applications and the device is incredibly popular. Evidence of this can be seen with the fact that the 64% of all new programs and applications are designed for the Android. While the Apple I Phone is accounting for just 27% of the total mobile applications that are developed. This is significant, in showing how the markets are shifting with new technology becoming more mobile. (Tongbo, 2012) However, there are major security risks associated with using the either device. This is because the firewall and traditional protections on various applications are weaker. As a result, hackers have been able to directly target any kind of security features, overcome them and have...

This increases the chances that someone could have their most sensitive information compromised. To fully understand what is taking place requires looking at the different tools that are being utilized to gain access to the Android. Once this takes place, is when these vulnerabilities will be exposed (which allows for the company and users to protect themselves). (Tongbo, 2012)
The Strategies Hackers are using to Access the Android

The basic strategy that hackers are using to target Android customers is through: malicious applications and web pages. The utilization of malicious applications is when criminals will trick the user into uploading a specific program on their phone. This can occur, through the developer creating a solution that will work like a Trojan horse (once it is uploaded). While at the same time, they can break into legitimate applications and insert their codes into them. In either case, they can see and access…

Sources used in this document:
Reference

Tongbo, L. (2012). Attacks on Web View. CIS. Retrieved from: http://www.cis.syr.edu/~wedu/Research/paper/webview_acsac2011.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Marketing SLP Target Market Brand Image Competitor
Words: 1106 Length: 4 Document Type: Case Study

Marketing SLP Target Market Brand Image Competitor Analysis Environmental Analysis Porters Five Force Model Current Rivalry Threat of New Entrants Bargaining Power of Suppliers Bargaining Power of Buyers Threat of Substitute Products Apple has had an exceptional growth streak over the last decade and represents a suitable target for a marketing analysis. Apple has seen sales and revenue peeks in the last few years which is at least due to the fact that sales in China have ballooned. China, which is

Business Information Systems Intuit Case
Words: 1509 Length: 5 Document Type: Thesis

For a product configuration system to be effective it must be able to submit orders directly into production while at the same time being able to determine what the Available-To-Promise (ATP) ship dates are (Mendelson, Parlakturk, 2008). Instead of just giving the standard four to six weeks I'd also integrate the product configuration systems to supply chain systems to ensure that accurate Available-To-Promise (ATP) dates (Gunasekaran, Ngai, 2009). I'd

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now