ITS PURPOSE IS
IS

MOBILE MALWARE

MALICIOUS SOFTWARE DESIGNED TO TARGET MOBILE DEVICE SYSTEMS (SMARTPHONE, TABLET OR PDA)

BLUETOOTH HACKING

BLUESNARFING

HACKERS CAN PURCHASE SOFTWARE TO ALLOW THEM TO REQUEST INFORMATION FROM USER'S DEVICES

BLUEBUGGING

AN ATTACK TO GAIN TOTAL ACCESS AND CONTROL OF A DEVICE. THE HACKER CAN ACCESS ALL THE INFORMATION ON THE SMARTPHONE, INCLUDING PHOTOS, APPS, CONTACTS

BLUEJACKING

A HACKER SEARCHES FOR DISCOVERABLE DEVICES IN THE AREA AND THEN SENDS SPAM IN THE FORM OF TEXT MESSAGES TO THE DEVICE

MOBILE SPECIFIC MALWARE

GHOST PUSH

INFECTS THE ANDROID O/S BY AUTOMATICALLY GAINING ROOT ACCESS. IT HOGS ALL SYSTEM RESOURCES MAKING IT UNRESPONSIVE AND DRAINS THE BATTERY

EXPANDER

TARGETS MOBILE METERS FOR ADDITIONAL PHONE BILLING AND PROFITS IN A WAY THAT IS SIMILAR TO THE ONES USED BY DIALLERS WITH COMPUTERS

THAT OF CAUSING THE COLLAPSE OF THE SYSTEM OR STEALPERSONAL INFORMATION STORED ON THE SAME DEVICES

MALWARE IN COMPUTER DEVICES

SPYWARE

MONITORS THE SYSTEM AND SYNCHRONISES WITH CALENDARS, EMAIL ACCOUNTS, NOTES AND ANY OTHER SOURCE OF INFORMATION TO SEND DATA TO A MALICIOUS SERVER

WORM

MAY BE TRASMITTED VIA TEXT MESSAGES (SMS OR MMS) AND TYPICALLY DOES NOT REQUIRE THE USER'S INTERACTION FOR EXECUTION

TROJAN HORSE

INTO SEEMINGLY ATTRACTIVE AND NON-MALICIOUS EXECUTABLE FILES OR APPS THAT ARE DOWNLOADED INTO THE DEVICE AND EXECUTED BY THE USER