Zobrazeno 1 - 5
of 5
pro vyhledávání: '"A. G. Beltov"'
Publikováno v:
Безопасность информационных технологий, Vol 19, Iss 2S, Pp 22-25 (2012)
The authors analyze the attacks on mobile devices that use the mechanism of an automatic configuration OMA/OTA, whose aim is listening to the Internet traffic of subscribers and the intrusion of malicious software on the user’s device, and suggest
Externí odkaz:
https://doaj.org/article/0fabb9d1e6b74139aa08c07eba9ea0fd
Publikováno v:
Безопасность информационных технологий, Vol 19, Iss 2S, Pp 32-35 (2012)
The article reviews the most common mistakes made by developers when writing software for mobile platforms which lead to appearing vulnerabilities that allow attackers to perform various types of attacks. The basic principles of defensive programming
Externí odkaz:
https://doaj.org/article/016c6f42fd7044d095774967ae2b1d00
Publikováno v:
Безопасность информационных технологий, Vol 19, Iss 2S, Pp 5-7 (2012)
The article provides an overview of security problems which exist in the mobile devices. The main technologies aimed to protect the phones from various types of attacks are considered. The authors justify the necessity of developing new improved tool
Externí odkaz:
https://doaj.org/article/2af0e9672dd2457db0ca5cdc9b357558
Publikováno v:
Безопасность информационных технологий, Vol 19, Iss 2S, Pp 54-56 (2012)
The article is dedicated to the attacks on Bluetooth devices. The described attacks allow hackers to steal private data from mobile devices. The attack is based on vulnerabilities found in OBEX and OBEX FTP profiles of Bluetooth protocols stack.
Externí odkaz:
https://doaj.org/article/e356df2bd76442a786c4e08ab797148f
Publikováno v:
Безопасность информационных технологий, Vol 19, Iss 2S, Pp 57-59 (2012)
The article is dedicated to the attacks on Bluetooth devices. The described attacks allow hackers to steal private data from mobile devices. The attack is based on vulnerabilities found in RFCOMM-level of Bluetooth protocols stack. The described atta
Externí odkaz:
https://doaj.org/article/c4324114510d4c2081b2fe6fc69e388a