Wyniki 1-1 spośród 1 dla zapytania: authorDesc:"Michał Ciołek"


  Modern methods of combating threats related to data processing and transmission also cover within their scope, and maybe first of all, user end terminals, including the more and more popular smartphones. Mobile operating systems (OS), on which applications are installed and activated must inter alia have integrated and continuously updated mechanisms for protection against harmful software. The potential and expansion of smartphones and tablets influenced the necessity of development of a new branch of operating systems - mobile operating systems. Their main features include intuitive interfaces using touch screens and optimised structure cooperating with limited resources. At present the most popular systems are Android, iOS and Windows Phone. One of the leaders in the development of mobile devices is the operating system Android of the Google brand [1]. Openness of the platform and ease of personalisation make the Android ahead of any other mobile operating systems. The increasing popularity of the Android system also results in the growth of undesirable attacks and threats towards the platform. This is accompanied by enhanced actions aimed at creation of malware. 2. CONTEMPORARY THREADS Together with the appearance of mobile access to the Internet and increasing computing power of smartphones they have become an attractive target for hackers in the course of implementation of mobile botnets. The reports related to security [2] indicate that in 2013 only 1.2% of the entire malware was focused on mobile devices, but as much as 99% on the devices operating on the Android. The number of virus samples increased in the first half of 2014 up to 751 thousand, as compared to 672 thousand in the first half of 2013 [3]. In comparison with the traditional botnets such type of software is aimed at accessing sensitive personal data located on mobile devices and their computational resources. In September 2013 analysts of the comp[...]

 Strona 1