CELL PHONE VIRUSES AND SECURITY
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Computer Science Clay
Active In SP
**

Posts: 712
Joined: Jan 2009
#1
01-03-2009, 02:09 PM


CELL PHONE VIRUSES AND SECURITY

As cell phones become a part and parcel of our life so do the threats imposed to them is also on the increase. Like the internet, today even the cell phones are going online with the technologies like the edge, GPRS etc. This online network of cellphones has exposed them to the high risks caused by malwares viruses, worms and Trojans designed for mobile phone environment. The security threat caused by these malwares are so severe that a time would soon come that the hackers could infect mobile phones with malicious software that will delete any personal data or can run up a victim s phone bill by making toll calls.

All these can lead to overload in mobile networks, which can eventually lead them to crash and then the financial data stealing which poises risk factors for smart phones. As the mobile technology is comparatively new and still on the developing stages compared to that of internet technology, the anti virus companies along with the vendors of phones and mobile operating systems have intensified the research and development activities on this growing threat, with a more serious perspective.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
sumitgupta47
Active In SP
**

Posts: 3
Joined: Jun 2009
#2
12-06-2009, 03:17 PM

(01-03-2009, 02:09 PM)stuff Wrote: CELL PHONE VIRUSES AND SECURITY

As cell phones become a part and parcel of our life so do the threats imposed to them is also on the increase. Like the internet, today even the cell phones are going online with the technologies like the edge, GPRS etc. This online network of cellphones has exposed them to the high risks caused by malwares viruses, worms and Trojans designed for mobile phone environment. The security threat caused by these malwares are so severe that a time would soon come that the hackers could infect mobile phones with malicious software that will delete any personal data or can run up a victim s phone bill by making toll calls.

All these can lead to overload in mobile networks, which can eventually lead them to crash and then the financial data stealing which poises risk factors for smart phones. As the mobile technology is comparatively new and still on the developing stages compared to that of internet technology, the anti virus companies along with the vendors of phones and mobile operating systems have intensified the research and development activities on this growing threat, with a more serious perspective.

plz send me all the details related to this topic for seminar and presentation presentation(with slides..)plzzzzzzzzzzzzzzz.............
Reply
seminar projects crazy
Active In SP
**

Posts: 604
Joined: Dec 2008
#3
13-06-2009, 03:31 PM

A mobile phone virus is a computer virus specifically adapted for the cellular environment and designed to spread from one vulnerable phone to another. Although mobile phone virus hoaxes have been around for years, the so-called Cabir virus is the first verified example. The virus was created by a group from the Czech Republic and Slovakia called 29a, who sent it to a number of security software companies, including Symantec in the United States and Kapersky Lab in Russia. Cabir is considered a "proof of concept" virus, because it proves that a virus can be written for mobile phones, something that was once doubted.

Cabir was developed for mobile phones running the Symbian and Series 60 software, and using Bluetooth. The virus searches within Bluetooth's range (about 30 meters) for mobile phones running in discoverable mode and sends itself, disguised as a security file, to any vulnerable devices. The virus only becomes active if the recipient accepts the file and then installs it. Once installed, the virus displays the word "Caribe" on the device's display. Each time an infected phone is turned on, the virus launches itself and scans the area for other devices to send itself to. The scanning process is likely to drain the phone's batteries. Cabir can be thought of as a hybrid virus/worm: its mode of distribution qualifies it as a network worm, but it requires user interaction like a traditional virus.

Cabir is not considered very dangerous, because it doesn't cause actual damage, and because users can prevent infection by simply refusing to accept suspicious files. However, the virus's code could be altered to create more harmful malware that might, for example, delete any information stored on phones it infects, or send out fake messages purporting to be from the phone's owner.

read more electronics.howstuffworkscell-phone-virus4.htm
download full seminar and presentation topics here
dspace.cusat.acdspace/bitstream/123456789/2107/1/CELL%20PHONE%20VIRUS%20&%20SECURITY.pdf
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
mohitkhanna.31
Active In SP
**

Posts: 1
Joined: Mar 2010
#4
18-03-2010, 08:00 PM

plz can u send full report here
Reply
computer science topics
Active In SP
**

Posts: 610
Joined: Jun 2010
#5
29-06-2010, 12:36 AM

CELL PHONE VIRUSES AND SECURITY
Abstract

Cell phones have become powerful and sophisticated computing devices and are moving toward an always on form of networking. However, such powerful networked computers are also at risk for a new class of malware, including viruses, worms and trojans specifically designed for a mobile environment. This seminar and presentation topic covers a taxonomy of attacks against mobile phones that shows known as well as potential attacks. Understanding existing threats against mobile phones helps us better protect our information and prepare for future dangers. Security experts are finding a growing number of viruses, worms, and Trojan horses that target cellular phones. Security researchers attack simulations have shown that before long, hackers could infect mobile phones with malicious software that deletes personal data or runs up a victim\'s phone bill by making toll calls. The attacks could also degrade or overload mobile networks, eventually causing them to crash, financial data stealing, and Risk factors for smart phones. Mobile-device technology is still relatively new, and vendors have not developed mature security approaches. An introduction to security concerns in mobile appliances. To counter the growing threat, antivirus companies have stepped up their research and development. In addition, vendors of phones and mobile operating systems are looking for ways to improve security. Recent innovations and emerging commercial technologies that address these issues are also incorporated in the topic.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
seminar class
Active In SP
**

Posts: 5,361
Joined: Feb 2011
#6
27-04-2011, 10:35 AM


.ppt   MOBILE PHONE VIRUS.ppt (Size: 1.26 MB / Downloads: 167)
INTRODUCTION
• Phone
– Make calls
– Send texts
– 21st century phone
– More functionality
– More private data
– More internet access
• Grater efficiency
Efficiency of phone
• Gets into the host’s phone via internet or from other phones
• Copies itself inside the phone
• Attaches itself to the files and programs
• Executes itself with out owner’s knowledge
• Needs user authentication
• Current actions
– Make calls to pay per minute numbers
– Accessing and modifying the data
– Prevent phone from booting
– Unwanted booting
– Drains phone’s battery
• Futuristic actions
– Location tracking
– Call tracking
– Leaking sensitive information
Spread Vector
• Web download
• Bluetooth
• MMS
• Memory card
• Computer
• First verified mobile virus
• Developed in 2004 by a group named 29A
• Proof concept of mobile virus
CARIBE
• Functionality
– Platform : symbian 60
– Spread vector : bluetooth
– Tries to send itself to all bluetooth enabled devices
– Installs itself as a.SIS filename
– CARIBE is displayed on infected phone’s display, on rebooting
– Continue bluetooth scanning drains phone’s battery
– Does not spread if the user does not accept the file-transfer
– No real harms
• Current state is harmless
COMMWARRIOR
• Origin : RUSSIA
• Got world wide attention on 2005
• Spread vector : MMS and bluetooth
• Platform : symbian 60 Smartphone
• Sends infected files to phone’s contact
• Fastest spread virus
• Detected by F-Secure Mobile Anti-Virus
SKULLS
• Platform : symbian OS
• Appears as a program to offer new wallpapers and icons
• Replaces all phone icons with images of a skull
• Renders all phone applications
• Infected phone can only make calls
Motives to create virus
• Curiosity
• Challenge
• Gain wider attention
• New antivirus companies
Install antivirus
• A computer program
Conclusion
• We should not accept files from unknown people without confirmation.
• We should not download suspicious files from internet.
• Installing antivirus programs makes good sense, especially if we want to keep our smart phones healthy.
• We simply need to be worried about the viruses that might make our mobile phone sick.
Reply
m.manju08
Active In SP
**

Posts: 1
Joined: Jul 2011
#7
16-07-2011, 01:10 AM

hello hi..........
can u pls snd me the slides presentations of topic 'Cell Phone Virus and Security'.
Reply
seminar addict
Super Moderator
******

Posts: 6,592
Joined: Jul 2011
#8
16-07-2011, 10:00 AM

you can refer these page details of "CELL PHONE VIRUSES AND SECURITY"link bellow

topicideashow-to-cell-phone-viruses-and-security

topicideashow-to-cell-phone-viruses-and-security?pid=51207#pid51207


topicideashow-to-cell-phone-virus-and-security--23573

Reply
priyaanka bakshi
Active In SP
**

Posts: 1
Joined: Aug 2011
#9
19-08-2011, 12:26 PM

i want a complete descruption on cell phone viruses n anti-vireses ....for seminaar ........
Reply
seminar addict
Super Moderator
******

Posts: 6,592
Joined: Jul 2011
#10
09-02-2012, 10:24 AM

to get information about the topic CELL PHONE VIRUS AND SECURITY full report ,ppt and related topic refer the link bellow

topicideashow-to-cell-phone-viruses-and-security

seminar and presentationproject and implimentationsattachment.php?aid=14005

topicideashow-to-cell-phone-virus-and-security--23573

topicideashow-to-cell-phone-viruses-and-security?page=2

topicideashow-to-cellular-virus-attack-full-report

topicideashow-to-mobile-virus-full-report?pid=39845#pid39845

topicideashow-to-mobile-virus-full-report?page=2
Reply
mayabalan
Active In SP
**

Posts: 4
Joined: Aug 2012
#11
10-08-2012, 10:55 PM

i have to download the seminar and presentation report ..please help me.....
Reply
seminar tips
Super Moderator
******

Posts: 8,857
Joined: Oct 2012
#12
18-12-2012, 11:57 AM

to get information about the topic "source code for virus protection system for mobile phone" full report ppt and related topic refer the link bellow

seminar and presentationproject and implimentationsattachment.php?aid=14005

topicideashow-to-cell-phone-viruses-and-security?page=2

topicideashow-to-mobile-virus-full-report
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  laser security system wikipedia jaseelati 0 970 01-01-2015, 04:22 PM
Last Post: jaseelati
  air force security using thumb checker jaseelati 0 331 27-12-2014, 04:01 PM
Last Post: jaseelati
  security using colors and armstrong numbers ppt jaseelati 0 256 27-12-2014, 03:33 PM
Last Post: jaseelati
  factors on which emf of a cell depends jaseelati 0 130 23-12-2014, 01:15 PM
Last Post: jaseelati
  factors on which internal resistance of a cell depends jaseelati 0 289 20-12-2014, 04:18 PM
Last Post: jaseelati
  large scale power generation using fuel cell ppt download jaseelati 0 224 20-12-2014, 02:01 PM
Last Post: jaseelati
  INFRARED PLASTIC SOLAR CELL seminar ideas 1 2,274 29-07-2014, 03:37 PM
Last Post: Guest
  ADVANCED VEHICLE SECURITY SYSTEM WITH THEFT CONTROL AND ACCIDENT NOTIFICATION seminar ideas 2 2,464 10-01-2014, 02:07 PM
Last Post: seminar project topic
  Solar Cell Emulator and Solar Cell Characteristics Measurements In Dark pdf study tips 0 373 06-09-2013, 04:06 PM
Last Post: study tips
  Physical Layer Security over Wireless Channels seminar flower 2 835 31-08-2013, 09:22 AM
Last Post: study tips