Carried out by luring victims into downloading and installing malicious apps designed and published by attackers in the form of games, photo editors, or other attractive tools from third-party app stores such as 9Apps
Agent Smith Attack
Unsolicited text/email messages sent to mobile devices from known/unknown phone number and email IDs
Mobile Spam
the act of trying to acquire personal and financial information by sending SMSs (Instant Messages or IMs) containing deceptive links
SMS Phishing Attack (SMiShing)
An attack that allows the attacker to take control of a device's SIM card.
Simjacker
a communication protocol that allows mobile users to exchange communication through another cellular network
Signaling System 7 (SS7)
provides platforms for over-the-air or wired distribution of applications and data and configuration settings for all types of mobile devices, including mobile phones, smartphones, and tablet computers
Mobile Device Management (MDM)
a policy that allows an employee to bring their personal devices, such as laptops, smartphones, and tablets, to their workplace and use them to access the organization's resources by following the access privileges
Bring Your Own Device (BYOD)
Your experience on this site will be improved by allowing cookies.