1 / 13

Vulnerabilities in Mobile Applications and Input Systems

Vulnerabilities in Mobile Applications and Input Systems. Natalia Tituana.

jmarlow
Download Presentation

Vulnerabilities in Mobile Applications and Input Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Vulnerabilities in Mobile Applications and Input Systems Natalia Tituana

  2. Mobile applications and Input systems have their vulnerabilities in the way they are controlled. This can range from how they are created as well as how easy it is to access them without user authorization. I’ll explore the many ways in which vulnerabilities can hinder these systems ability to operate effectively and safely. Introduction

  3. What are mobile applications and input systems? • Mobile applications are web based softwares that can be downloaded on a mobile phone. They range from email, video, social media and even banking purposes. • Input systems are devices that can be paired with a computer or gaming console.

  4. Vulnerabilities in Mobile Applications What kind of vulnerabilities can affect mobile applications? Mobile apps can be affected by many inconveniences, such as crashes and errors. Therefore software maintenance is important. But when it comes to a weakness, developers may not realize that their apps have a bug and therefore causes the app to perform irregularly.

  5. Apple’s FaceTime App Bug In recent weeks, giant tech company Apple, was faced with a bug that affected their video chatting application FaceTime. The bug allowed users to make a call but also see and hear the call recipients conversations without them having answered the call. This vulnerability is critical to a users privacy and in having it can lead to potential hackers stealing information and as well as revealing it to other cyber criminals.

  6. Applications As Spyware? Another vulnerability with using mobile applications is that they can be utilized as a form of spyware. For example, app developers can create their application to record the users key logs and screen activity. This is called “session replay”, wherein developers are able to view any information typed on the screen. This includes any personal information such as credit card info, addresses, etc.

  7. Applications As Spyware? (continued) In recent weeks, giant tech company Apple warned app developers to cease their use of “session replay” or their app would banned from the App Store. This is a way for the company to comply with their privacy regulations. This vulnerability in apps is another manner in which users must be careful. If app developers are recording user activity, it poses a greater risk for that information to fall into the wrong hands. It can be argued that this is a form of spyware because users are being watched through their usage activity without their consent.

  8. Resolution A resolution to these issues are to closely examine any possible cracks that may need patching up. Although patching may not be the only solution, since it maybe be prone to opening up a new set of bugs. Another solution is to do vigorous testing and app maintenance. In the case of applications tracking user activity, the best solution has already been provided by the application store. But another solution can be to not download the application altogether.

  9. Vulnerabilities In Input Systems Input systems range from microphones, keyboards, controllers, and webcams. In recent years there has been an increase in hackers illegally gaining access into the webcams and microphones of many personal PCs. Many have thought of this as another sense of paranoia, therefore it is nothing to be worried about. But, we’ve even seen individuals such as billionaire Mark Zuckerberg covering the webcam on his PC.

  10. Vulnerabilities In Input Systems (continued) Although many may believe that covering webcams with tape is a measure of paranoia, there is one case that stands out in this form of privacy invasion. That being the brazen invasion of privacy suffered by Miss Teen USA in 2013.

  11. This is a great example because it proves that not only do these cyber crimes really happen, but also that no one is exempt from it happening to them. These types of crimes often lead to lives being ruined, wherein the person being blackmailed takes their own life. It can happen to almost anyone without them knowing, which is what happened in this example. In these types of crimes the criminals often seek money. Vulnerabilities In Input Systems (continued)

  12. Resolution One may say that a resolution to prevent webcam/microphone hacking is to disconnect and or tape up webcams. But other solutions involve changing and creating stronger passwords for our devices. Another solution can also be to use a secured network, therefore potential cyber criminals are out of luck when trying to gain unauthorized access. Another resolution is to utilize a VPN or virtual private network for an extra added layer of security, specifically for IP addresses.

  13. Conclusion To conclude, when we introduce ourselves to different forms of technology we must look at its weaknesses and strengths. Although technology is becoming smarter, we have to take the next step in outsmarting it. We must continue to teach ourselves and others to be safe with technology and not only rely on it to think for us. We must also be informed on new changes and what potential security risks it poses for us as well as what security measures we can take to prevent it.

More Related