Professional Documents
Culture Documents
Cybercrime:
Mobile and
Wireless
Devices
Topic: 3.1, 3.2, 3.3, 3.4, 3.8
• Wireless networks, allowing communications from
any device, anywhere and anytime
• Manufacturing
• Healthcare
• Military
Types of • Tablet PC
• Internet Tablet
Mobile • Personal Digital Assistant
Computers • Ultramobile PC
• Smartphone
3.3
Trends in
Mobility
Key Findings of Mobile
Computing Security Scenario
attacks
• Cabir Worm
• Mosquito Trojan
• Denial-of-Service
against 3G • Overbilling Attack
Mobile
• Spoofed Policy Development Process
• Signaling Level Attack
Networks
• Trends coming-up with mobile computing:
• M-Commerce
3.4 • M-Banking
Credit Card • Mobile Credit Card transactions are very common with
low cost mobile technology with point of scale terminal
Frauds in • Anywhere Anytime Computing
• DO’s
Tips to prevent Credit Card Frauds
• Dont’s
Merchant sends a transaction to bank
How to protect:
• Download or Accept programs from only trusted sites.
• If a mobile is equipped with Bluetooth, turn it OFF or
set it to non discoverable mode when not in use.
• If the mobile is equipped with beam, allow it to receive
incoming beams, only from the trusted source.
• Download and install antivirus software for mobile
devices.
Mishing
Bluetooth
• Bluetooth Hacking Tool
Thank You