Journal of Computer and Communications

Volume 6, Issue 2 (February 2018)

ISSN Print: 2327-5219   ISSN Online: 2327-5227

Google-based Impact Factor: 1.12  Citations  

Phishing Techniques in Mobile Devices

HTML  XML Download Download as PDF (Size: 459KB)  PP. 27-35  
DOI: 10.4236/jcc.2018.62003    1,999 Downloads   5,221 Views  Citations
Author(s)

ABSTRACT

The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing a phone call to performing critical and sensitive tasks like money payments. Since the mobile device is accompanying a person most of his time, it is highly probably that it includes personal and sensitive data for that person. The increased use of mobile devices in daily life made mobile systems an excellent target for attacks. One of the most important attacks is phishing attack in which an attacker tries to get the credential of the victim and impersonate him. In this paper, analysis of different types of phishing attacks on mobile devices is provided. Mitigation techniques—anti-phishing techniques—are also analyzed. Assessment of each technique and a summary of its advantages and disadvantages is provided. At the end, important steps to guard against phishing attacks are provided. The aim of the work is to put phishing attacks on mobile systems in light, and to make people aware of these attacks and how to avoid them.

Share and Cite:

Amro, B. (2018) Phishing Techniques in Mobile Devices. Journal of Computer and Communications, 6, 27-35. doi: 10.4236/jcc.2018.62003.

Cited by

[1] Online safety experiences of autistic young people: An Interpretative Phenomenological Analysis
Research in Autism Spectrum …, 2022
[2] EXPERIMENTAL STUDY TO ASSESS THE IMPACT OF TIMERS ON USER SUSCEPTIBILITY TO PHISHING ATTACKS
Journal of …, 2022
[3] The Moderating Effect of Personalization on the Influence of Consumer Privacy Concerns on Mobile Technology Adoption
2022
[4] A Review of Phishing Attacks
2022
[5] Security practices of smartphone users at UKZN Westville Campus and its effects on the institutional information systems.
2021
[6] MMWD: An efficient mobile malicious webpage detection framework based on deep learning and edge cloud
2021
[7] A Systematic Literature Review on Phishing and Anti-Phishing Techniques
2021
[8] Pause for a Cybersecurity Cause: Assessing the Influence of a Waiting Period on User Habituation in Mitigation of Phishing Attacks
2021
[9] A Third-Party Intelligent System for Preventing Call Phishing and Message Scams
2020
[10] The Human Attack Surface Framework for Phishing
THESIS, 2020
[11] An Awareness Policy Framework for Cyber Security Social Engineering Threats
2020
[12] IoT for 5G/B5G applications in smart homes, smart cities, wearables and connected cars
2019
[13] Anti-phishing Models for Mobile Application Development: A Review Paper
2019
[14] PAPG--Personalized Anti-Phishing Guard
2019
[15] Analyze of Phishing Violence and Alleviation
2019
[16] Optimasi Algoritma C4. 5 Dalam Prediksi Web Phishing Menggunakan Seleksi Fitur Genetic Algoritma
2018
[17] Short Message Service Fraud Mitigation Taxonomy: The Case of ethio telecom
2018
[18] Optimasi Algoritma C4. 5 Menggunakan Genetic Algoritma Dalam Memprediksi Website Phishing
SNIT 2018, 2018
[19] Cybercriminal Behavior Model to Counteract Phishing in the Financial Ecosystem in Colombia

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.