Search This Blog

Wednesday, March 20, 2013

My Smartphone?

On a daily basis, most of us communicate and do business on a smartphone. Which is basically, a mobile device that generally runs on an operating system, makes use of apps, web access, and the QWERTY keyboard. And "The number of users with mobile devices is expected to climb to 5.2 billion in 2017 from 4.3 billion in 2012 and traffic across high-speed 4G networks will grow 40-fold during that time" (Guglielmo). So, what does that mean?




Well, this means more targets for hackers to choose from. After all, a smartphone is essentially a miniature mobile computer. They both have processors, memory, and internet capabilities. And us smartphone users, never really take the time to think about the possibility of having our phones targeted by a cyber-attack. As "Security experts have warned for years that our smartphones are due for a major cyber-attack. Like PCs back in the early days -- the 1990s -- mobile phones are largely unprotected by antivirus software, and they're a treasure trove of valuable information" (Goldman).





And we as consumers and users, should be more wary of the possible cyberattacks that imposes on smartphones. As smartphones
"contain the same vulnerabilities as laptops and desktops, but they also contain other vulnerabilities such as using airwaves instead of wires to connect to the Internet[.] Denial of services attacks specifically designed for wireless devices and new custom financial applications like digital wallets and pocket ATMs that are particularly attractive to hackers" (Aitoro).
However, that doesn't mean we can't arm ourselves with security measures. Just like an ordinary desktop, smartphones can also have anti-virus software installed. And there's a wide variety to choose from such as Avast and Norton

No matter where you are, something as little as you're own phone can pose as a vulnerability to a cyber-attack. 


Works Cited

Aitoro, Jill R. "Nextgov." Cell Phones, Other Wireless Devices next Big Cybersecurity Targets. N.p., 10 June 2009. Web. 20 Mar. 2013.

Cassavoy, Liane. "What Makes a SmartphoneƂ Smart?" About.com Cell Phones. N.p., n.d. Web. 20 Mar. 2013.

Guglielmo, Connie. "Cisco Mobile Data Shows Surge in Smartphone Users, 4G Usage." Forbes. Forbes Magazine, 06 Feb. 2013. Web. 20 Mar. 2013.

Goldman, David. "Cyberattack: Your Smartphone Will (eventually) Be Hacked." CNNMoney. Cable News Network, 17 Sept. 2012. Web. 20 Mar. 2013.

"QWERTY Keyboard." What Is Qwerty Keyboard? N.p., 2013. Web. 20 Mar. 2013.



3 comments:

  1. You have some excellent data here, but I cannot tell from which some of those quotes come from. That means you have to clarify which source you're quoting from in the text by use of either naming the source right before the quote ("According to X, ...") or providing an in-text citation at the end of the quote. Don't make readers guess who said what.

    Also, at the beginning of paragraph 2, you ask the question, "So what does that mean." Remember that each paragraph is a stand-alone document, so that we need clear subjects to propel the content forward. Did you mean all of that data from the end of paragraph 1? I think so...so repeat a data point and expand on it. Readers will roll with you: most of us now are smart phone users, right? And we have so many important items on our phones now, including pictures, links to mobile banking, phone numbers, personal identifying information, etc.

    ReplyDelete
  2. Just as Ms. Quinn said, I would like to see where the quote is from. This is really intriguing because I have a smartphone myself, and I have never realized how open my phone is to others. I was thinking to myself that smartphones are protected due to the fact that it is a phone line, and that my cellular network would keep my phone safe.

    ReplyDelete
  3. I noticed you included data about how there are more smartphone users now and the growth can be expected to continue. Do you think that this growth is too fast, or that it should be limited at all (age, location, etc.)? I have personally relied on my smartphone multiple times to keep my personal information as well.

    ReplyDelete