Academic Journals Database
Disseminating quality controlled scientific knowledge

cell phone security: Emerging Threats, Essential Strategies

Author(s): Ritika Saroha

Journal: Journal of Current Engineering Research
ISSN 2250-2637

Volume: 3;
Issue: 3;
Date: 2013;
Original page

Keywords: Malware | Spam | Cloning | Wi-Fi | Spoofing

The Cellular phones have become important tools in today's modern lifestyle. These are small in size and are relatively inexpensive. Earlier cell phones can be used only for voice calls, simple text messages, and Personal Information Management (PIM) (e.g. phonebook, calendar).While cell phones provide productivity benefits, they also pose new risks to organizations. This document gives details about the threats and technology risks associated with the use of cell phones and the available safeguards to make these risks comparatively less effective. Organizations can use this information to enhance security and reduce incidents involving cellular phones.
Why do you need a reservation system?      Save time & money - Smart Internet Solutions