Windows Operating System

  • Chapter
  • First Online:
Understanding Cybersecurity on Smartphones

Abstract

This chapter describes the Windows Operating System (OS), providing an overview of its history, vulnerabilities, adversarial techniques, malware types, current solutions for mitigating attacks, and the utilization of Windows mobile services. The chapter begins by delving into the basics of Windows OS history, tracing its evolution and significant milestones. It then explores the cybersecurity landscape of Windows, discussing the vulnerabilities and risks associated with the OS. Adversarial techniques employed to exploit Windows vulnerabilities are examined, shedding light on the tactics used by attackers. The chapter proceeds to dissect various types of Windows OS malware, highlighting the diverse range of threats targeting the platform. Current solutions for mitigating attacks on Windows devices are explored, outlining the measures implemented to enhance security and protect user data. Furthermore, the trend of utilizing Windows mobile services is discussed, providing insights into the latest developments in this area. Overall, this chapter offers a comprehensive understanding of Windows security concerns and advancements in utilizing Windows mobile services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 47.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
GBP 59.99
Price includes VAT (United Kingdom)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. “Windows mobile OS: A brief history” by Sagar Khillar, Interesting Engineering, July 9, 2020. Available at: https://interestingengineering.com/windows-mobile-os-a-brief-history

  2. “A brief history of Windows Mobile OS” by Russell Holly, Android Central, January 30, 2016. Available at: https://www.androidcentral.com/brief-history-windows-mobile-os

  3. “A visual history of Windows Mobile” by Daniel Rubino, Windows Central, April 29, 2015. Available at: https://www.windowscentral.com/visual-history-windows-mobile

  4. IDC. (2016). Smartphone OS Market Share, 2015 Q4. Retrieved from https://www.idc.com/promo/smartphone-market-share/os

  5. Mohammad, D. R., Al-Momani, S., Tashtoush, Y. M., & Alsmirat, M. (2019). A comparative analysis of quality assurance automated testing tools for Windows mobile applications. In 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 0414–0419).

    Google Scholar 

  6. Jansen, W. (2021). Microsoft 365 for business and enterprise. Springer International Publishing.

    Google Scholar 

  7. Grønli, T. M., Hansen, J., Ghinea, G., & Younas, M. (2014, May). Mobile application platform heterogeneity: Android vs. Windows Phone vs. iOS vs. Firefox OS. In 2014 IEEE 28th international conference on advanced information networking and applications (pp. 635–641). IEEE.

    Google Scholar 

  8. Ahvanooey, M. T., Li, Q., Rabbani, M., & Rajput, A. R. (2020). A survey on smartphone security: Software vulnerabilities, malware, and attacks. ar**v preprint ar**v:2001.09406

    Google Scholar 

  9. **ao, C. (2016). DualToy: New Windows Trojan sideloads risky apps to android and iOS devices. https://unit42.paloaltonetworks.com/dualtoy-new-windows-trojan-sideloads-risky-apps-to-android-and-ios-devices/

  10. Allievi, A., & Flori, E. (2018). FinFisher exposed: A researcher’s tale of defeating traps, tricks, and complex virtual machines. https://www.microsoft.com/en-us/security/blog/2018/03/01/finfisher-exposed-a-researchers-tale-of-defeating-traps-tricks-and-complex-virtual-machines/

  11. Microsoft. (2017). Twin zero-day attacks: PROMETHIUM and NEODYMIUM target individuals in Europe. https://www.microsoft.com/en-us/security/blog/2016/12/14/twin-zero-day-attacks-promethium-and-neodymium-target-individuals-in-europe/?source=mmpc

  12. Lookout. (2018). Dark Caracal: Cyber-espionage at a Global Scale. https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf

  13. NortonLifeLock. (2021). NortonLifeLock Cyber Safety Insights Report. Retrieved from https://us.norton.com/internetsecurity-emerging-threats-cyber-safety-insights-report-volume-1-2021.pdf

  14. Microsoft. (2015, July 23). Dialer.BZ: Premium phone scam trojan on Windows phones. Microsoft Security. https://www.microsoft.com/security/blog/2015/07/23/dialer-bz-premium-phone-scam-trojan-on-windows-phones/

  15. BBC News. (2017). WannaCry ransomware cyber-attacks slow but fears remain. Retrieved from https://www.bbc.com/news/technology-39901382

  16. Luo, Y., Zhu, H., Wang, Z., & Liu, P. (2016). Kemoge: Understanding mobile ad fraud in action. Proceedings of the 33rd annual computer security applications conference (ACSAC).

    Google Scholar 

  17. Akamai. (2020). State of the internet/security: Phishing for finance. Retrieved from https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/state-of-the-internet-security-phishing-for-finance-report-2020.pdf

  18. “Acecard banking trojan now targeting Windows Phone users,” SC Magazine. (2015).

    Google Scholar 

  19. KrebsOnSecurity. (2016). KrebsOnSecurity Hit with Record DDoS. Retrieved from https://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/

  20. Cuthbertson, A. (2016). Windows Phone SMS malware threat discovered in Russia. https://www.newsweek.com/windows-phone-sms-malware-threat-russia-449919

  21. Vähäkainu, P., & Lehto, M. (2022). Use of artificial intelligence in a cybersecurity environment. In Artificial intelligence and cybersecurity: Theory and applications (pp. 3–27).

    Google Scholar 

  22. IBM, IBM MaaS360 Mobile Device Management (SaaS), visited in 2023. https://www.ibm.com/docs/en/maas360

  23. IBM, Windows Phone 8 device MDM, visited in 2023. https://www.ibm.com/docs/en/maas360?topic=windows-enrolling-your-phone-8-device-mdm

  24. Deep instinct, https://www.deepinstinct.com/

  25. Zhang, Y., Dai, Z., Zhang, L., Wang, Z., Chen, L., & Zhou, Y. (2020). Application of artificial intelligence in military: From projects view. In 2020 6th International Conference on Big Data and Information Analytics (BigDIA) (pp. 113–116).

    Google Scholar 

  26. IBM Security QRadar Suite, IBM, https://www.ibm.com/qradar?utm_content=SRCWW&p1=Search&p4=43700074872917601&p5=e&gclid=CjwKCAjw1MajBhAcEiwAagW9MRLPpIdZxX5v4Cref8OJHY9QwQ35RD6wxdScMcFG4D4tMsWk7e5gpBoCNLIQAvD_BwE&gclsrc=aw.ds

  27. Sadowski G, Kavanagh K, Bussa T (2020). Critical capabilities for security information and event management. Gartner Group Research Note.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Abdul Kadir, A.F., Habibi Lashkari, A., Daghmehchi Firoozjaei, M. (2024). Windows Operating System. In: Understanding Cybersecurity on Smartphones. Progress in IS. Springer, Cham. https://doi.org/10.1007/978-3-031-48865-8_4

Download citation

Publish with us

Policies and ethics

Navigation