Introduction

  • Chapter
  • First Online:
Understanding Cybersecurity on Smartphones

Abstract

This chapter outlines a comprehensive overview of the smartphone industry, focusing on smartphone history, market share evolution, security and privacy, and cybersecurity challenges. It begins by tracing the evolution of smartphones and the changing market shares of different operating systems and manufacturers. The importance of security and privacy in smartphones is emphasized, including discussions on application stores, security principles, privacy concerns, and vulnerabilities. The chapter then delves into cybersecurity challenges, highlighting adversarial techniques, attack types and impacts, and the rise of on-the-go malware. Practical mitigation measures are suggested, such as downloading files from trusted sources, educating employees about malware infections, using multi-factor authentication, and regularly patching software. The chapter concludes with a summary of the key points covered, providing a holistic understanding of the smartphone industry and the associated security considerations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 58.84
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
EUR 74.89
Price includes VAT (Germany)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://play.google.com/

  2. 2.

    https://www.amazon.com/gp/mas/get/android/

  3. 3.

    https://www.getjar.com/

  4. 4.

    https://en.aptoide.com/

  5. 5.

    https://www.apple.com/ca/app-store/

  6. 6.

    https://www.apple.com/ca/itunes/

  7. 7.

    https://www.applandinc.com/

  8. 8.

    https://apps.microsoft.com/store/apps

  9. 9.

    https://www.samsung.com/ca/apps/galaxy-store/

  10. 10.

    https://www.blackberry.com/us/en

  11. 11.

    https://my.audi.com/

  12. 12.

    https://www.washingtonpost.com/politics/2021/10/01/ransomware-attack-might-have-caused-another-death/

References

  1. Kanjo, E., Bacon, J., Roberts, D., & Landshoff, P. (2009). MobSens: Making smartphones smarter. IEEE Pervasive Computing, 8(4), 50–57.

    Article  Google Scholar 

  2. Trifan, A., Oliveira, M., & Oliveira, J. L. (2019). Passive sensing of health outcomes through smartphones: A systematic review of current solutions and possible limitations. JMIR mHealth and uHealth, 7(8), e12649.

    Article  Google Scholar 

  3. Mobile Design and Development. (n.d.). O’Reilly Online Learning. Retrieved January 11, 2022, from https://www.oreilly.com/library/view/mobile-design-and/9780596806231/ch01.html

  4. Acs, Z. J., Song, A. K., Szerb, L., Audretsch, D. B., & Komlosi, E. (2021). The evolution of the global digital platform economy: 1971–2021. Small Business Economics, 57, 1629–1659.

    Article  Google Scholar 

  5. Shakya, R. K., Rana, K., Gaurav, A., et al. (2019). Stability analysis of epidemic modeling based on spatial correlation for wireless sensor networks. Wireless Personal Communications, 108, 1363–1377.

    Article  Google Scholar 

  6. O’Loughlin, K., Neary, M., Adkins, E. C., & Schueller, S. M. (2019). Reviewing the data security and privacy policies of mobile apps for depression. Internet Interventions, 110–115.

    Google Scholar 

  7. Cleary, G. (2018). Mobile privacy: What do your apps know about you? [Online]. Accessed 2023, from https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/mobile-privacy-apps

  8. Pham, L. (2021). Mobile application: Definition, technology types and examples 2023. Accessed 2023, from https://magenest.com/en/mobile-application/

  9. Ahvanooey, M. T., Li, Q., Rabbani, M., & Rajput, A. R. (2017). A survey on smartphones security: Software vulnerabilities, malware, and attacks. International Journal of Advanced Computer Science and Applications, 8, 30–45.

    Google Scholar 

  10. Dogtiev, A. (2023). App stores list. Accessed 2023, from https://www.businessofapps.com/guide/app-stores-list/

  11. Alsmadi, I. (2019). Cyber security management. In The NICE cyber security framework (pp. 243–251). Springer.

    Google Scholar 

  12. Brook, C. (2023). What is data integrity? Definition, types and tips. Accessed 2023, from https://www.digitalguardian.com/blog/what-data-integrity-data-protection-101

  13. Tan, Y. S., Ko, R. K. L., & Holmes, G. (2013) Security and data accountability in distributed systems: A provenance survey. In IEEE international conference on high-performance computing and communications & 2013 IEEE international conference on embedded and ubiquitous computing.

    Google Scholar 

  14. Hande, S. A., & Mane, S. B. (2015). An analysis on data accountability and security in cloud. In International Conference on Industrial Instrumentation and Control (ICIC), Pune.

    Google Scholar 

  15. CIPL and Hodges, C. (2021). Organizational accountability in data protection enforcement, [Online]. Accessed 2023, from https://www.informationpolicycentre.com/uploads/5/7/1/0/57104281/cipl_white_paper_on_organizational_accountability_in_data_protection_enforcement_-_how_regulators_consider_accountability_in_their_enforcement_decisions__6_oct_2021_.pdf

  16. Mayernik, M. S. (2017). Open data: accountability and transparency. Big Data and Society, 4(2), 1–5.

    Article  Google Scholar 

  17. Hoboken, J. V., & Fathaighb, R. O. (2021). Smartphone platforms as privacy regulators. Computer Law and Security Review, 41.

    Google Scholar 

  18. Ma, X., Du, Z., & Liu, J. (2018). Program power profiling based on phase behaviors. Sustainable Computing: Informatics and Systems, 19, 341–350.

    Google Scholar 

  19. Amplifiers, W. (2022). Cellular vs. Wifi: How safe is cellular data?. Accessed 2023, from https://www.wilsonamplifiers.com/blog/cellular-vs-wifi-how-safe-is-cellular-data/#

  20. Firoozjaei, M. D., Lu, R., & Ghorbani, A. A. (2020). An evaluation framework for privacy-preserving solutions applicable for blockchain-based internet-of-things platforms. Security and Privacy, 131.

    Google Scholar 

  21. Khana, J., Abbas, H., & Al-Muhtadi, J. (2015). Survey on mobile user’s data privacy threats and defense mechanisms. In International workshop on cyber security and digital investigation (CSDI 2015).

    Google Scholar 

  22. Delgado-Santos, P., Stragapede, G., Tolosana, R., Guest, R., Deravi, F., & VeraRodriguez, R. (2022). A survey of privacy vulnerabilities of mobile devices sensors. ACM Computing Surveys, 54(11), 1–30.

    Article  Google Scholar 

  23. Baumgärtner, L., Dmitrienko, A., Freisleben, B., Gruler, A., Höchst, J., Kühlberg, J., Mezini, M., Mitev, R., Miettinen, M., Muhamedagic, A., Nguyen, T. D., Penning, A., Pustelnik, D., Roos, F., Sadegi, A., Schwarz, M., & Uhl, C. (2020). Mind the GAP: Security & privacy risks of contact tracing apps. In IEEE 19th international conference on trust, security, and privacy in computing and communications (TrustCom).

    Google Scholar 

  24. Ali, A., Somroo, N. A., Farooq, U., Asif, M., Akour, I., & Mansoor, W. (2022). Smartphone security hardening: Threats to organizational security and risk mitigation. In 2022 International conference on cyber resilience (ICCR) (pp. 1–12). IEEE.

    Google Scholar 

  25. Desai, M., & Jaiswal, S. (2020). Importance of information security and strategies to prevent data breaches in mobile devices. In Improving business performance through innovation in the digital economy (pp. 215–225). IGI Global.

    Chapter  Google Scholar 

  26. Adăscăliţei, I. (2019). Smartphones and IoT security. Informatica Economica, 23(2), 63–75.

    Article  Google Scholar 

  27. A. (2020, October 7). Top 8 mobile device cyber threats you should know to protect your data! Stealthlabs. Retrieved February 2, 2022, from https://www.stealthlabs.com/blog/top-8-mobile-cybersecurity-threats-you-should-know-to-protect-your-data/

  28. Hartrell, G. D., Steeves, D. J., & Hudis, E. (2012). Malicious code infection cause and effect analysis. https://patentimages.storage.googleapis.com/28/2d/57/2ab93c1faaf698/US8117659.pdf. US Patent 8,117,659

  29. Mobile Techniques, MITRE ATT&CK. (2023). https://attack.mitre.org/techniques/mobile/ [online].

  30. Clipboard Data, MITRE ATT&CK. (2023). https://attack.mitre.org/techniques/T1414/ [online].

  31. Xu, E. & Guo, G. (2019). Mobile campaign ‘Bouncing Golf’ affects Middle East, [online]. https://www.trendmicro.com/en_us/research/19/f/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east.html

  32. Gevers, R., Barbatei, A. M., Tivadar, M., Balazs, B., Bleotu, R., Coblis, C. (2019). Uprooting mandrake: The story of an advanced Android Spyware Framework that went undetected for 4 years. Bitdefender, [online], https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf

  33. Lookout. (2019). Monokle- the mobile surveillance tooling of the special technology center, [online], https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf

  34. Threat Fabric. (2019). Cerberus - A new banking Trojan from the underworld, [online], https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html

  35. Snow, J. (2016). Triada: organized crime on Android, [online], https://www.kaspersky.com/blog/triada-trojan/11481/

  36. Iarchy, R., & Rynkowski, E. (2018). GoldenCup: New cyber threat targeting world cup fans, [online], https://symantec-enterprise-blogs.security.com/blogs/expert-perspectives/goldencup-new-cyber-threat-targeting-world-cup-fans

  37. Firoozjaei, M. D., Mahmoudyar, N., Baseri, Y., & Ghorbani, A. A. (2022). An evaluation framework for industrial control system cyber incidents. International Journal of Critical Infrastructure Protection, 36, 100487.

    Article  Google Scholar 

  38. MITRE ATT@CK, Native API. Access in 2023, from https://attack.mitre.org/techniques/T1575/

  39. Case, A., Lassalle, D., Meltzer, M., Koessel, S., Adair, S., Lancaster, T. (2020). Evil eye threat actor resurfaces with iOS exploit and updated implant, [online], https://www.volexity.com/blog/2020/04/21/evil-eye-threat-actor-resurfaces-with-ios-exploit-and-updated-implant/

  40. Lookout. (2018). Stealth Mango & Tangelo. Security Research Report, [online], https://info.lookout.com/rs/051-ESQ-475/images/lookout-stealth-mango-srr-us.pdf

  41. Hossain, M., Rafi, S., & Hossain, S. (2020). An optimized decision tree based android malware detection approach using machine learning. In Proceedings of the 7th international conference on networking, systems, and security (pp. 115–125).

    Google Scholar 

  42. Lookout. (2020). Mobile APT Surveillance Campaigns Targeting Uyghurs, [online], https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malwaretr-us.pdf

  43. Flossman, M. (2017). FrozenCell: Multi-platform surveillance campaign against Palestinians, [online], https://www.lookout.com/blog/frozencell-mobile-threat

  44. MITRE ATT@CK. Matrix for Enterprise. Access in 2023, from https://attack.mitre.org/

  45. Guardsquare. (2017). New Android vulnerability allows attackers to modify apps without affecting their signatures, [online], https://www.guardsquare.com/blog/new-android-vulnerability-allows-attackers-to-modify-apps-without-affecting-their-signatures-guardsquare

  46. Possemato, A., Aonzo, S., Balzarotti, D., & Fratantonio, Y. (2021). Trust, but verify: A longitudinal analysis of Android OEM compliance and customization. In 2021 IEEE symposium on security and privacy (SP) (pp. 87–102).

    Google Scholar 

  47. **ao, H. Z., Dong, Q., & Jiang, X. (2014). Oldboot: The first bootkit on Android. Qihoo 360 Technology Co. Ltd.

    Google Scholar 

  48. Hazum, A., He, F., Marom, I., Melnykov, B., & Polkovnichenko, A. (2019). Agent Smith: A new species of mobile malware, [online], https://research.checkpoint.com/2019/agent-smith-a-new-species-of-mobile-malware/

  49. Husainiamer, M. A., Saudi, M. M., Ahmad, A., & Syafiq, A. S. M. (2021). Mobile Malware Classification for iOS Inspired by Phylogenetics. International Journal of Advanced Computer Science and Applications, 12(8).

    Google Scholar 

  50. Kondiloglu, A., et al. (2017). Information security breaches and precautions on Industry 4.0. Технологический аудит и резервы производства, 6.4(38), 58–63.

    Google Scholar 

  51. Zheng, C., **ao, C., & Xu, Z. (2016). New Android Trojan “Xbot” Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom, Security Research Report, [online], https://unit42.paloaltonetworks.com/new-android-trojan-xbot-phishes-credit-cards-and-bank-accounts-encrypts-devices-for-ransom/

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Abdul Kadir, A.F., Habibi Lashkari, A., Daghmehchi Firoozjaei, M. (2024). Introduction. In: Understanding Cybersecurity on Smartphones. Progress in IS. Springer, Cham. https://doi.org/10.1007/978-3-031-48865-8_1

Download citation

Publish with us

Policies and ethics

Navigation