Monday 22 June 2015

SECURITY ATTACK ON SAMSUNG


SECURITY ATTACK ON SAMSUNG 




Chicago-based mobile-security firm NowSecure has found a flaw that could give hackers nearly complete control over Samsung's Galaxy S6, S5, S4 and S4 Mini devices, including the phones' cameras and microphones. The vulnerability, which may affect up to 600 million handsets, stems from Samsung's pre-installed version of the popular SwiftKey keyboard; Samsung does not encrypt the executable files it transmits as updates to users.

The flaw was made public only yesterday (June 16) at the Black Hat London security conference, but NowSecure says it notified Samsung in December 2014, and that the handset maker distributed a patch to cellular network operators earlier this year.

However, there appears to be no way in which an end user can confirm that his or her device has been patched by the carrier, nor any available method of user mitigation. NowSecure advises that Samsung Galaxy users should consider switching to a different brand of phone for the time being. (Samsung did not immediately respond to a request for comment from Tom's Guide.)

Malicious hackers could exploit the flaw to conduct man-in-the-middle attacks on Samsung devices operating on an unsecured Wifi network, or set up fake cellular base stations to do the same. The attacker would prompt the Samsung keyboard app to accept and install a malicious update file.

Because the keyboard app (which is separate from the stand-alone SwiftKey app available in the Google Play store) runs as a privileged user, it has much more access to the Android operating system than a regular app would, and a malicious update would turn the keyboard app into super-malware capable of almost anything. An attacker could peep through your camera, listen to your microphone (your calls, for example), access your GPS transceiver to track your location, install more malicious apps and access photos stored on your device.

Updating the stand-alone SwiftKey app is pointless, since it is separate from the built-in Samsung keyboard (which cannot be uninstalled), as is switching to another default keyboard, since the Samsung keyboard will continue to run in the background.

Since a patch does exist for this specific vulnerability, and the exploit is so far only a proof of concept, it may all seem like not much to worry about. Unfortunately, there is plenty of opportunity for copycat hacks, as NowSecure has posted the code behind its exploit. Furthermore, mobile network operators are notoriously slow at pushing out updates, and not informing end users of what's being fixed when updates are pushed out.

According to NowSecure, as of July 16, the following devices have not received that patch from their mobile network providers:

Samsung Galaxy S6 on Verizon
Samsung Galaxy S6 on Sprint
Samsung Galaxy S5 on T-Mobile
Samsung Galaxy S4 Mini on AT&T
As for an additional dozen Galaxy devices on the major carriers that may be vulnerable, the firm has yet to test them. But in its technical report, NowSecure does have some very blunt advice for all owners of Samsung Galaxy S6, S5, S4 and S4 Mini smartphones: "Avoid insecure Wi-Fi networks, use a different mobile device and contact your carrier for patch information and timing."
FOR MORE:http://www.tomsguide.com/us/samsung-galaxy-keyboard-flaw,news-21135.html

PUSHBULLET

PUSHBULLET





PUSHBULLET IS A HANDY LITTLE APPLICATION and browser extension
pushbullet allows user to easily share files, notification, links. and other material between 
your phone and your computer. pushbullet can send your phone's notification such as messages call
to your desktop,
and also you can share notes, links, lists, and files across all of your devices. pushbullet having
"channels" feature which sends notifications from a variety of sources such as online deals, 
website newsfeeds, news, and more

MOBILE SPY BASIC VERSION


MOBILE SPY BASIC VERSION





this application is different from other parent control....
the purposefully designed for parents whose teen are almost certainly spending
too much time on their smartphones...
by using "mobile spy" you find out where your kids are and have their phones most recent pictures
and texts emailed to you. and also provides an overview of location history, browsing history, messages and call logs.

Thursday 18 June 2015

SMART WATCH

Smart watches




Hot on the heels of the Pebble and Samsung Galaxy Gear smart watches, will surely come newer and more innovative mobile-linked wristpieces.

In fact, at the 2014 Mobile World Congress expo, we're bound to see loads of the things in a concept stage.

But 2014 will be the year Apple launches one. Or maybe it won’t.

Both of which would be a big story.

The first would show the potential power of these products and the second would dismiss the idea as a fad if a company like Apple fails to take up the gauntlet.

No doubt, in time, we'll discover which one.

DIGITAL SMART WATCH

DIGITAL MOBILE WATCH



Similarly, 2016 will be the year of technology that you wear - and not just on your wrist or nose.

The whole sector looks set to increase throughout our lives on the back of the growing trend for wearable fitness devices that track exercise progress and healthy living.

Expect to see products built into clothing as well as stuff you can physically wear yourself.

CONCEPT ELECTRIC BIKE LEAOS WITH CHARGING FROM THE SUN


Concept Electric bike Leaos with charging from the sun.







Leaos little-known company is working to create the eponymous bicycle equipped with an electric motor. The main feature of this mode of transport will be the presence of integrated built-in batteries that will store electrical energy, to convert from sunlight

THE FUTURE'S SMART TABLE


Smart table based on Windows and Android.


Ideum company surprised the world in the past the curious novelties, but this time its developers decided to hit the audience on a grand scale. Device designed to cause delight and surprise,was the “smart”, neither more nor less,, a table, which get the nice name Duet.
Smart table is made literally in the form most of the coffee, or coffee table.. The table top is made in the form of a huge touch screen with support for multiple simultaneous touches, and it may be displayed the interface of one of the two installed OS. It works as touch computer system, transmits images in resolution Full HD, which, moreover, provides for the needs of the user two full OS: Android 4.4 mobile and Windows 8.

THE FUTURES SMART HOME


The smart-home

The Internet of Things (IoT) has, for some time, suggested the inter-connectivity of otherwise separate devices and ecosystems; connected devices improving the practicality of our day to day lives. 2015 will see the IoT come to a domestic setting in a big way – with connected devices pulling the idea of the smart home sharply into focus. Thanks to prospective pushes from the likes of LG and Samsung, the smart home market looks set for sudden growth. The industry drive may mean surges in home sensor and security products (accessed and controlled via a smartphone). But it will also mean more smart devices aimed at monitoring utilities and home systems, aiding productivity and delivering entertainment.

Monday 8 June 2015

GALAXY MOBILE INTO GAMING CONSOLE


GALAXY MOBILE INTO GAMING CONSOLE

GALAXY MOBILE INTO GAMING CONSOLE



The new Samsung Smartphone GamePad enhances your gaming experience on your Samsung smartphone . It sports gaming console like control keys and Bluetooth/NFC connectivity support . It is so portable and convenient that you can play your favorite game anytime and anywhere, it instantly transform your Samsung smartphone or tablet into a portable gaming console. It comes with rechargeable battery which you can charge by the connecting its microUSB port cable .

Samsung Smartphone GamePad key features :

Compatible with Samsung Android devices
Bluetooth, NFC wireless connectivity
Easy to carry
Durable and Compact
Support a variety of games
Support devices with 4-inches to 6.3-inches display

Specifications of Samsung Smartphone GamePad :

Compatibility
Android OS 4.1 more (Optimized for Samsung devices with Android 4.3 more)
Connectivity
Bluetooth v3.0, NFC(Samsung devices with Android 4.3 more)
3.0 class 2, HID
Control Keys
– D-Pad (8 way)
– 2 Analog Sticks
– 4 Action buttons and 2 Trigger buttons
– Select button and Start button
– PLAY button (Samsung devices with Android 4.3 more)
Dimension
137.78 x 86.47 x 31.80 mm
Weight
195g
Battery
Rechargeable : 160mA
Color : Black

DRIVERLESS CARS FROM GOOGLE


DRIVERLESS CARS FROM GOOGLE



Google on Friday announced it will begin testing prototypes of its fully autonomous self-driving cars on public roads. The vehicles won't roam too far from their Mountain View, California, home -- but this latest phase of testing could be critical both for cultivating positive consumer perceptions, and influencing future legislation affecting the nascent sector.Google has "a few" driverless car prototypes that will be testing this summer, said Chris Urmson, director of the Google Self-Driving Car Project. The prototypes are based on the familiar Smart Fortwo-like bubble designs that have become almost synonymous with self-driving cars.

Google previously had leaned heavily on modified Lexus RX450h SUVs to conduct its research into autonomous vehicle technologies. The SUVs have logged a close to a million miles of autonomous driving on test tracks and public roads since the start of the project, and they have been traveling roughly 10,000 miles each week, Urmson said.

Mountain View residents needn't worry about driverless cars flying around their neighborhoods at high speeds. The Google cars will operate at a "neighborhood-friendly" top speed of 25mph, and they'll have driver on board -- as well as a removable steering wheel, accelerator pedal, and brake pedal -- should manual operation be warranted, the company said.

In the coming years, Google wants to launch pilot programs so that it can learn more about how people would use driverless cars. For now, though, the company wants to gauge public perception of the vehicles and discover challenges unique to driverless cars.

NASA'S $2.25M CHALLANGE


NASA'S $2.25M CHALLANGE



NASA and America Makes have challenged innovators in the additive construction market to design a habitat for deep space exploration for the first stage of the competition and to fabricate such facilities in the second phase.

The organizations will award a $50,000 prize and a pair of US$1.1 million purses for the winners of the multistage challenge. Registration opened for phase one on Saturday, and the second stage will launch on September 27.

Entrants have been challenged to design a 3D-printable habitat for the first phase of the competition, and the team that wins that level will be awarded $50,000.

The second stage of the contest challenges teams to a) develop fabrication technologies; and b) build a 3D-printed habitat, using "indigenous" material with or without recycled materials. The winners of the two levels each will be awarded $1.1 million.

NASA has encouraged entrants to "think outside the box," so the organization expects the teams to get creative in approaches and to leverage advanced technologies to realize their designs, emphasized Janet L. Anderson, a spokesperson for NASA's Marshall Space Flight Center. Teams can compete in any level and won't be negatively impacted for focusing on one.

"Teams may perhaps develop a way to use heat to fuse materials, or use a chemical reaction to solidify a slurry material," Anderson told TechNewsWorld. "Any of these groundbreaking technologies could win the 3D-Printed Habitat Challenge, and go on to be a game changer for future NASA missions or commercial ventures."

Sunday 7 June 2015

NOKIA viNe service a real time GPS BASED social networking

NOKIA viNe service a real time GPS BASED social networking




Nokia has launched its GPS based “Nokia viNe” – a geotagging service.Nokia viNe is basically a prettier version of Nokia’s Sportstracker service, and uses your phone’s built-in GPS receiver to track where you go, what photos you take, and what music you’re listening to. This “vine” is then uploaded to the Nokia viNe site, so you can easily share with others. You can locate your friends on Maps through geotags. The viNe service  is compatible with some GPS enabled E and N Series handsets namely Nokia E71, Nokia N78, Nokia N79, Nokia N82, Nokia N85, Nokia N95 8GB, and Nokia N96. It uploads your media to the viNe website in order for others to keep track.This is a real-time social  networking and it has started now !!

F-SECURE ANTI THEFT MOBILE ANTI THEFT SOFTWARE MOBILE TRACKER


F-SECURE ANTI THEFT
MOBILE ANTI THEFT SOFTWARE
MOBILE TRACKER


With the new F-Secure Mobile anti-theft, you can remotely lock the phone and protect the information it contains with a single SMS message. If the phone is stolen and the thief changes the SIM card, the Theft Control feature locks the phone and informs you of the new number. As an ultimate safety measure to prevent misuse, it is possible to erase all the data on the phone with Remote Wipe.

So the key features of the new F-Secure Mobile phone anti-theft software are:

Lock your phone remotely
Erase the confidential data remotely
Get informed who stole your phone
The new F-Secure Anti-Theft for Mobile supports Symbian and Windows mobile platforms.

S60 5th Edition
S60 3rd Edition
Windows Mobile 6 Professional
Windows Mobile 6 Standard

WINDOWS 8 Vs WINDOWS 8pro WINDOWS RT


WINDOWS 8    Vs    WINDOWS 8pro   WINDOWS RT


Microsoft has announced the names of the Windows 8 Editions :

Windows 8
Windows 8 Pro
Windows RT
Windows 8 is the general x86/64 editions of Windows.Windows 8 and Windows 8 Pro Editions are for PCs and tablets powered by x86 processors (both 32 and 64 bit) .

As the name suggests , the Windows 8 Pro is designed for business/technical professionals and it sports features like encryption, virtualization, PC management and domain connectivity in addition to the all the features of the general Windows 8 OS .

Windows RT (Windows Runtime) is for the computers running on the ARM architecture. It will only be available pre-installed on PCs and tablets and supports longer battery life for the slim and compact machines.It will also feature touch-optimized desktop versions of the new Microsoft Word, Excel, PowerPoint, and OneNote.

Windows 7 to Windows 8 Upgrade :

If you are using Windows 7 Starter, Windows 7 Home Basic, or Windows 7 Home Premium then you can upgrade your OS to any of the Windows 8 or Windows 8 Pro .
If you are using Windows 7 Professional or Windows 7 Ultimate editions of the Windows 7 then you can only upgrade your OS to Windows 8 Pro .
Some of the unique features of Windows 8 Pro among other editions of the Windows 8 :

BitLocker and BitLocker To Go
Boot from VHD
Client Hyper-V
Domain Join
Encrypting File System
Group Policy
Remote Desktop (host)
Windows 8 Vs Windows 8 Pro Vs Windows RT 



FREE UPGRADE FOR WINDOWS 8 PCs


FREE UPGRADE FOR WINDOWS 8 PCs



Windows 8.1 , the next version of Windows 8 , will be available as a free upgrade from 18th October 2013 via an easy download from the Windows store for all the devices which runs on Windows 8 today.This upgrade-able version is launched nearly a year after launching Windows 8 . It will bring new features and improvements to Windows 8 such as greater personalization , Bing Smart Search, and more than 20 new and improved Microsoft apps and services. Up-gradation option is also available for those who run their systems on older versions of Windows.

People who are using older versions than Windows 8 will be able to buy Windows 8.1, either as a download from Windows.com or at your local store as a retail packaged DVD product. The pricing for Windows 8.1 and Windows 8.1 Pro varies by market but the pricing and editions for Windows 8.1 are similar to what we have today for Windows 8.

Windows 8.1 Price – $120 per PC .



Windows 8.1 does not require a previous version of Windows to be installed but it is a “full version software” , so it will be easier for those consumers who want to build PCs from scratch , run Windows 8.1 in Virtual Machine (VM) environments, or run Windows 8.1 on a second hard drive partition.

How to upgrade to Windows 8.1 using the retail DVD and downloading software :

Upgrade Windows 7 to Windows 8.1 : Consumers can upgrade a Windows 7 PC which will bring along all their files, but will require them to reinstall desktop apps including Microsoft Office.

Upgrade Windows XP & Windows Vista to Windows 8.1 : Windows 8.1 is not designed for installation on devices running Windows XP or Windows Vista. But if consumers still wants to upgrade from Windows XP or Windows Vista should buy the retail DVD instead of using the download and boot from the DVD to do a clean install of Windows 8.1. Here Consumers will need to back up their files and settings, perform clean installation, and then reinstall their files, settings and programs.

If you are planning to buy a device later this year that comes with the Windows 8.1 edition, then you can buy Windows 8.1 Pro Pack and Windows Media Center for $99.99 ERP (U.S.) . If you are on Windows 8 Pro, you can buy Windows Media Center for $9.99 (U.S.) . And if you are planning for a device now then  take advantage of PC Selector to find the right Windows 8 device, and you will be able to update your device to Windows 8.1 for free through the Windows Store.

TWO GIGA BITE EXTRA STORAGE IN GOOGLE DIRVE ON COMPLETETING ACCOUNT SECURITY CHECKUP


TWO GIGA BITE EXTRA STORAGE IN GOOGLE DIRVE ON COMPLETETING ACCOUNT SECURITY CHECKUP

google provide free additional 2gb data storage to the user who will complete their google account
security checkup the offer end on 17th feb 2015. even without any such offers it should be your
regular habit to keep checking these security settings to keep your account safe.

The security checkup has following step :

Go to Security checkup page
Recovery information – Confirm Recovery phone, Recovery email, Security question
Recent activity – review your recent account activity
Account permissions – review the apps, websites and devices connected to your Google Account. Make sure that you recognise, use and trust them all, or remove the ones you don’t
App passwords – passwords for apps that don’t use 2-Step Verification. Verify those apps
2-Step Verification settings – Verify the default phone number, backup phone number, and Backup codes
After you’ve gone through the checkup successfully, you’ll see three green checkboxes (see below) that confirm you’re eligible for the free storage and, more importantly, that you’ve taken steps to enhance your online safety. We’ll be granting the storage automatically to everyone around 28 February 2015 and we’ll send you an email when your adjustment is complete.

SAMSUNG NEW LAUNCH ROUND SMART WATCH ALONGSIED Galaxy NOTE 5


SAMSUNG NEW LAUNCH ROUND SMART WATCH ALONGSIED Galaxy NOTE 5

samungs's new product cirucular smart watch has been delayed until the second half of the
year, according to reports

Last month, Samsung quietly revealed that it is working on a round Gear smartwatch - because the company invited developers to start making apps for it in advance of a proper announcement.
Now the SDK is available, and it seems the watch has a big innovation in store.


Based on info pulled from that official software development kit, the new Gear watch will feature a rotating bezel that lets you scroll through menus and make other inputs without touching the screen. It still has a touchscreen, of course, but like the Apple Watch digital crown, it offers a way to interact without obscuring the view.

SamMobile has unearthed numerous screenshots and concept art images from the SDK, and it looks like you'll be able to use the bezel to move between contacts, scroll through options, zoom into an image, increase the volume, and a fair bit more. We've got a few of those below, but hit the source link for a deeper look at the interface.

Wednesday 3 June 2015

GOOGLE STARTS A NEW TYPE SECURE LOGIN


GOOGLE STARTS A NEW TYPE SECURE LOGIN

google introduces a new authentication apis to boost the security of its mobile an web apps.
Google has announced a new Google Identity Platform that gives developers a suite of tools to secure apps. The new tool allows users to sign in to third party apps with their Google Login similar to the way they login into service like Gmail, Play, Google+, and other Google services.

The platform has three flagship tools including Smart Lock for Passwords, Google Sign-in and Identity Toolkit. Smart Lock comes with an integrated password manager that allows users to sign in automatically to Android apps. The feature also supports auto fills credentials on websites viewed with Chrome. Smart Lock prefills login credentials across devices and prompts the app to save a password for future use. The tools have been used by Google to secure its services internally for some time now and have extended the functionality to third-party apps and developers through APIs now.

Google Sign-in allows users to securely connect to an app or site. The feature enables users to sign in with a Google account to log onto other third-party apps that integrate Google Sign-in. According to a report, New York Times claims that it has experienced a significant increase in new user sign-ups due to the new easier Google Sign-in. Google Identity Toolkit comes with a comprehensive authentication system which the company describes allows developers to "do sign-in the right way." The toolkit grows with apps and supports email and password authentication. Nontechnical developers can utilize the toolkit with simple configuration changes that add future sign-in options and migrate existing users.

Earlier today Google has also announced a 'My account' dashboard for users provides a 'step-by-step guide' through the users most important privacy and security settings. The new tool will give users more clarity on what information the internet giant can see from profiles and will also enable users to limit Google from logging their activities on PC's and mobile devices. The internet giant has been working to boost the security of its Web and mobile apps and has started tweaking its search ranking algorithms to encourage more websites to use secure encrypted connections. Last year, the company announced encryption for all Gmail messages.

FACEBOOK START'S NEW ARTIFICIAL INTELLIGENCE LAB IN PARIS


FACEBOOK START'S NEW ARTIFICIAL INTELLIGENCE LAB IN PARIS
facebook announces new aritificial intelligens

fb has opened an AI LAB in paris to an effort to make its online social network smarter and more profitable.
the social networking giant says that it plans to use AI to research through the flood of text, pictrue
and videos on its service

The social networking giant has been investing heavily in artificial intelligence and has set up a program called Facebook AI Research. The company already has artificial intelligence research teams in Menlo Park and in New York. The new Paris AI lab has six researchers at work and will double that number by year-end. Facebook says that the recruits for the lab will come from France's top public and private technological institutions. Facebook has hired Yann LeCun, a prominent French professor at New York University specializing in "deep learning" algorithm to head the lab. The AI applications would help to "eliminate spam and, eventually, violent videos" as well as open up new advertising avenues for Facebook. The company reportedly has doubled its European users since 2010 and has more users in Europe than in the US.
All major tech companies have been investing in artificial intelligence over the past few years. Rival Google also began an AI partnership with Oxford University in Britain in 2013. It acquired AI startup Deep Mind last year for more than $500 million. The company specializes in machine learning and describes itself as a developer of "cutting-edge artificial intelligence" that can learn for itself. Google also showed off a new digital assistant called Now on Tap at its recent I/O developer conference. Facebook said in a statement, "We chose Paris for this expansion because France is home to some of the best researchers in the world." Facebook plans to work with a team of researchers in Paris and says it plans to "work openly with and invest in the AI research community in France, the EU, and beyond as we strive to make meaningful progress in these fields. It's our hope that this research will ultimately help us make services like News Feed, photos and search even better and enable an entirely new set of ways to connect and share," the company said.


Facebook also announced a new feature that allows users to add PGP-encrypted keys to their profile. The new encryption would conceal messages and passwords from email services like Gmail and Yahoo, which regularly scan user inboxes for ad-targeting purposes. Users who use PGP to encrypt their email have two keys- a private key that they keep to themselves and the other is a public key that's given to anyone who wants to send them encrypted mail. Messages are encrypted using the public key but they can only be decrypted using the private key, so users will get an end-to-end encrypted email that only they can read.

Rumors about Microsoft's upcoming Windows device the -Lumia 940 XL


Rumors about Microsoft's upcoming Windows device the -Lumia 940 XL


Nokia has reported that the Lumia 940 XL has a 5.7 inch display with 1440 x 2560 pixels resolution and has Corning Gorilla Glass 4 protection.
It will have a slim design with a metal frame.
Other reported specifications include an octa-core Snapdragon 810 processor with 3 GB of RAM.
The smartphone will have 32 GB of onboard storage as well as microSD expandable phone memory.
It will also come with Microsoft's OneDrive 15 GB free storage.
The smartphone will feature a 20 MP rear PureView camera for photos and videos, and will feature native pen support as well.
It will also feature a 5 MP front camera.
The Nokia 940 XL is expected to come with WiFi, Bluetooth 4.0 , NFC support and may also have a Type-C reversible connector.
and additional security the smartphone is expected to come with an iris scanning tech.
The Windows Phone will also come with an inbuilt accelerometer, gyro, proximity and compass sensors.
and It will pack a 3300 mAh battery.
The Lumia 940XL may also come with some new Windows 10 Mobile features like Continuum for Phones.
The report suggests that Microsoft is developing some exclusive Windows 10 Mobile features like multi window support and 3D user interaction which could be a part of 940XL.
Microsoft is also working on a 5 inch Lumia 940 smartphone which will have similar specification as the Lumia 940XL.
The Windows Phone would compete with the latest flagship devices like the Samsung Galaxy S6, HTC One M9, Sony Xperia Z3+ and LG G4.
Microsoft hasn't officially confirmed the devices, although it has stated that there will be a flagship premium Windows 10 Mobile handset launched later this year.
The company is planning to launch Windows 10 OS for desktop in July, followed by smartphones and other devices later.
Apart from this Microsoft is also reportedly planning a successor to the Lumia 830, called the Lumia 840.
The smartphone is expected to have a 13 MP Pureview camera and a 5MP front camera.
It will also have a 5 inch display and a more powerful SoC than the Lumia 830 smartphone.

Monday 1 June 2015

NETWORK SECURITY THROUGH INTRUSION DETECTION SYSTEMS USING ARTIFICIAL INTELLIGENCE



                         NETWORK SECURITY THROUGH INTRUSION DETECTION SYSTEMS USING
                                                                        ARTIFICIAL INTELLIGENCE
                                                      


ABSTRACT

Intrusion detection systems have previously been built by hand. These systems have difficulty successfully classifying intruders, and require a significant amount of computational overhead making it difficult to create a robust real-time IDS system. Artificial intelligence techniques can reduce the human effort required to build these systems and can improve their performance. Learning and induction are used to improve the performance of search problems, while clustering has been used for data analysis and reduction. AI has recently been used in intrusion detection (ID) for anomaly detection, data reduction and induction, or discovery, of rules explaining audit data. We survey uses of artificial intelligence methods in ID and feature selection to improve the classification of network connections. The network connection classification problem is related to ID since intruders can create “private” communication services undetectable by normal means. We also explore some areas where AI techniques may further improve IDSs.
Introduction to network security:
                    A network is two or more machines interconnected for communications. When business is conducted, sensitive data is stored and transferred, and sensitive communications occur. Some opportunistic people might attempt to disrupt that business, steal or destroy the data, or exploit the communications.
   The goals of security must be confidentiality, integrity and availability.
.Who is attacking? An attacker can be either a hacker, or a cracker or a novice.
    The security mechanisms of a system are designed so as to prevent unauthorized access to system resources and data. Completely preventing breaches of security appear unrealistic at present. We can, however, try to detect these intrusion attempts so that the action may be taken to repair the damage later. This field of research is called intrusion detection.

 Introduction to intrusion detection
Intrusion detection is the process of monitoring and evaluating computer events and network traffic for signs of intrusions. It is a hardware device with software that is used to detect unauthorized activity on your network. They are burglar alarms of the computer security systems. IDS implementation can log and alert you to unauthorized activity on your network. IDS software can be implemented on individual hosts, servers, at the network perimeter or throughout the entire network.
    The aim is to defend a system by using a combination of an alarm that sounds whenever the site’s security has been compromised and an entity- most often a site security officer (SSO) - that can respond to the alarm and take the appropriate action. 

Need for IDS (INTRUSION DETECTION SYSTEMS):
1. In practice, it is not possible to build a completely secure system.
2. The vast installed base of systems world wide guarantees that any transition to a secure system will be long in coming.
3. Cryptographic methods have their own problems. Passwords can be cracked, lost and entire crypto-systems can be broken.
4. A truly secure system is vulnerable to abuse by insiders who abuse their privileges.
5. It has been that the relationship between the level of access control and user efficiency is an inverse one, which means that the stricter the mechanisms, the lower the efficiency becomes.
    An IDS does not usually take preventive measures when an attack is detected; it is a           reactive rather than pro-active agent.
    The most popular way to detect intrusions has been by using the audit data generated by Operating System. An audit trail is a record of activities on a system that are logged to file in chronologically sorted order. Audit trails are particularly useful because they can be used to establish guilt of attackers and they are often the only way to detect unauthorized but subversive user activity. This is a good substitute for manual analysis.
    Intruders can be classified as internal and external. External intruders are unauthorized users of machines they attack. Internal intruders masquerade as another user, those with legitimate access to sensitive data, or the clandestine intruders who have the power to turn off audit control for themselves.
Problems in intrusion detection: 
Issues in intrusion detection include data collection, data reduction, behaviour classification, reporting and response. Data reduction reduces processing time, communications overhead and storage requirements. Classification is the process of identifying attackers and intruders. Artificial intelligence techniques have been used in many Intrusion Detection Systems to perform these important tasks in a more efficient manner.
Classification of IDS
Techniques of intrusion detection are of two main types-anomaly detection and misuse detection. 
Anomaly detection: 
These techniques assume that all intrusive activities are necessarily anomalous. There are two problems here.
1) anomalous activities that are not intrusive are flagged as intrusive.
2) Intrusive activities that are not anomalous result in false negatives.
    So, the main issues in the anomaly detection system become the selection of threshold levels so that neither of the two problems is unreasonably magnified and the selection of features to monitor. These systems are also computationally expensive 
because of the overhead of keeping track of and updating several system profile metrics.

Misuse detection: 
The concept here is that there are ways to represent attacks in the form of a pattern or signature so that even variations of same attack can be detected i.e. they can detect many or all known attack patterns but are of little use for as yet unknown attack methods.                      
           
Anomaly detection systems
Statistical approaches: 
Behaviour profiles for subjects are generated. As system runs, anomaly detector constantly generates the variance of present profile from the original one. The main advantage to statistical systems is that they adaptively learn the behaviour of users; they are thus potentially more sensitive than human experts. However, there are a few problems. They can be gradually trained by intruders so that eventually intrusive events are considered normal, false positives and false negatives are generated depending on whether the threshold is set too low or too high and relationships between events are missed because of statistical measures to order of events. 
    An open issue here is the selection of measures to monitor. A static and dynamic determination of the set of measures should be done. Some problems associated with this technique have been remedied by other methods, including the method of involving ‘Predictive Pattern Generation’ which takes part events into account while analysing the data.
2.3.3 Attacks captured by software
IGMP KOD
Predictive pattern generation: 
This method tries to predict future events based on the events that have already occurred. Therefore, there can be a rule
      E1 - E2   - -> (E3 =80%,  E4  =15%,   E5  =5%)
 This would mean that given that events E1 and E2 have occurred, with E2 occurring after E1 there is an 80% probability that event E3 will follow, a 15% chance that event E4 will follow and a 5% probability that event E5 will follow. The problem with this is that some intrusion scenarios that are not described by the rules will not be flagged intrusive Thus, if an event sequence A –B –C exists that is intrusive, but not listed in the rule base, it will be classified as unrecognised. This problem can be partially solved by flagging any unknown events as intrusions (increasing the probability of false positives), or by flagging them as non-intrusive (thus increasing the probability of false negatives). In the normal case, however, an event is flagged intrusive if the left hand side of a rule is matched, but the right hand side is statistically very deviant from the prediction.
    There are several advantages here. Rule based sequential patterns can detect anomalous activities that were difficult with traditional methods. Systems built using this model are highly adaptive to changes. It is easier to detect users who try to train system during its learning period. Anomalous activities can be detected and reported within seconds of receiving audit events.
Neural networks: 
The idea used here is to train the neural network to predict a user’s next action or command given the window of n previous actions or commands. The network is trained on a set of representative user commands. Some advantages of using neural networks are they cope well with noisy data, their success does not depend on any statistical assumption about the nature of the underlying data and they are easier to modify for new user communities. There are also some problems. A small window results in false positives while a large window results in irrelevant data as well as increase of false negatives. The net topology is only determined after considerable trial and error. The intruder can train the net during its learning phase.
Misuse detection systems: 
Expert systems are modelled in such a way as to separate the rule matching phase from the action phase. The matching is done according to audit trail events. Next Generation Intrusion Detection Expert Systems (NIDES) follows a hybrid intrusion detection technique consisting of misuse detection component as well as an anomaly detection component, the anomaly detectors based on statistical approach. The misuse detection component encodes known intrusion scenarios and attack patterns. One advantage is it has a statistical component as well as an expert system component. So, the chances of one system catching intrusions missed by the other increase. Another advantage is problem’s control reasoning is clearly separated from the formulation of the solution.
    Some drawbacks for the expert systems are the expert system has to be formulated by a security professional and thus the system is only as strong as the security personnel who programs it. So, there is a chance that expert systems can fail to flag intrusions.
    The NIDES system runs on a machine different from the machine(s) to be monitored which could be unreasonable overhead. Additions and deletions of rules from rule-base must take into account the inter-dependencies between different rules in the rule-base and there is no recognition of sequential ordering of data, because the various conditions that makeup a rule are not recognised to be ordered.

Keystroke monitoring: 
It is a technique that monitors keystrokes for attacks. Here, there are several defects—features of shells like bash, ksh, and tcsh in which user definable aliases are present defeat the technique unless alias expansion and semantic analysis of the commands is taken up. This method does not analyse running of a program, only keystrokes. So, malicious programs cannot be flagged for intrusive activities. Operating System does not offer much support for keystroke capturing, so keystroke monitor should have a hook that analyses keystrokes before sending them to intended receiver. Also, system calls should be monitored by application programs as well so that an analysis of the program’s execution is possible.
Model based intrusion detection: 
 It states that certain scenarios are inferred by certain other observable activities. If these activities are monitored, it is possible to find intrusion attempts by looking at activities that infer a certain intrusion scenario.
    The model based scheme consists of three important modules. The anticipator uses active modules and scenario modules (knowledge base of intrusion scenario specification) try to predict next step in the scenario that is expected to occur. Planner then translates this hypothesis into a format that shows behaviour as it would occur in audit trail. It uses predicted information to plan what to search for next. The interpreter then searches for this data in the audit trail. The system proceeds this way accumulating more and more evidence for an intrusion attempt until a threshold is crossed, at this point signals an intrusion attempt.
    Large amounts of noise present in audit data can be filtered. System can predict attacker’s next move based on intrusion model. These predictions can be used to verify an intrusion hypothesis to take preventive measures or determine what data to look for next.
    Some critical issues are:  patterns for intrusion scenarios must be easily recognised. Patterns must always occur in the behaviour being looked for. The patterns must be distinguishing; they must not be associated with any other normal behaviour.

 State transition analysis:
 In this technique, the monitored system is represented as state transition diagram. As data is analysed, the system makes transitions from one state to another. A transition takes place on some Boolean condition being true. The approach is to have state transitions from safe to unsafe states based on known attack patterns. 
    Advantages are it can detect co-operation attacks, it can detect attacks that span across multiple user sessions, and it can foresee impending compromise situations based on present system state and take pre-emptive measures.
    Problems are attack patterns can specify only a sequence of events rather than more complex forms. There are no general purpose methods to prune the search except through assertion primitives. They cannot detect denial of service attacks, failed logins, variations from normal usage and passive listening because these items are either not recorded by the audit trail mechanism or they cannot be represented by state transition diagrams. It should be used with anomaly detector so that more intrusion attempts may be detected by their combination.

Pattern matching: 
This model encodes known intrusion signatures as patterns that are then matched against audit data. It makes transitions on certain events, called labels and Boolean variables called guards can be placed at each transition.
    Important advantages are declarative specification, portability, excellent real time capabilities, detects some attack signatures that state transition model cannot, multiple event streams can be used together to match against patterns for each stream without the need to combine streams.
    Problems are it can only detect attacks based on vulnerabilities. It is not useful for ill-defined patterns. It cannot detect wire-tapping intrusions nor can it detect spoofing attacks where a machine pretends to be another machine by using its IP address.
ARTIFICIAL INTELLIGENCE AND INTRUSION DETECTION:                          
Artificial intelligence is concerned with improving algorithms by employing problem solving techniques used by human beings. 
Data reduction for intrusion detection: 
Due to the massive amount of audit data available, classification by hand is impossible. Also, complex relationships exist between the features that are difficult for humans to discover. So, the amount of data to be processed should be reduced. Data that is not considered useful can be filtered. Data can be grouped or clustered to reveal hidden patterns; by storing the characteristics of the clusters instead of data, overhead can be reduced. Feature selection can also be used to eliminate some data sources.
Data filtering: 
The purpose is to reduce the amount of data directly handled by Intrusion Detection Systems. This decreases storage requirements and reduces processing time. Data filtering is done using heuristic or ad hoc methods, which can be viewed as expert rules for filtering.
Feature selection: 
Some data hinders classification process. Features may contain false correlations which hinder the process of detecting intrusions. Some of the features may be redundant since their information is contained in others. Feature selection improves classification by searching for the subset of features which best classifies the training data. It is used to find features most indicative of misuse, or can be used to distinguish between types of misuse. 
Data clustering: 
This is used to find hidden patterns in data and significant features for use in detection and can also be used as a reduction technique by storing the characteristics of clusters. There is a close relationship between learning and clustering. Hence this is used by AI. 
Behaviour classification in intrusion detection:
  Classification has drawbacks like false positives and false negatives. AI techniques can be used to improve this.      
Expert systems: 
In this system, a set of rules encoding knowledge of an expert are used to make conclusions about matter gathered by IDS. The expert determines the most appropriate rule to select. This can be implemented with a neural network which reports anomalies to the expert system and also employs data not used by the net.

Using feature selection in network based intrusion detection: 
Computer systems are increasingly network dependent. Hence, it is imperative to protect both local and regional networks. An intruder can hide network connections by strategically placing the servers that receive the connections on different ports. The mapping of ports to services is internal to a single machine; an intruder could also change the port map. Thus, identification of type of connection made without referring to port numbers is mandatory. 
    We can improve classification of n/w connections by minimizing classification error rate and by reducing the number of features required to classify connections by using feature selection algorithms.
Search algorithms
1. Backward sequential search begins with a full set of features. At each stage of search, each feature in the remaining set is removed. The best feature to be eliminated is determined by comparing the error rates of the classifiers created using the resulting feature sets.
2. Beam search is a type of best first search which uses a bounded queue and the best state is placed in the front of the queue. The algorithm operates by taking the first state in the queue and extending the search as in backward sequential search. Each new state visited is placed in the queue in the order of goodness of its state.
3. In random generation plus sequential selection several sequential selections from different places in the search space are performed. To do so, we generate a random feature set, then perform backward and forward sequential selection of the state. This is the best search algorithm among the three.
Future uses of AI in intrusion detection: 
Many IDS’s employ AI methods in their systems for improvement. Some of the AI techniques are:
Feature selection in intrusion detection systems
Reconfiguration and customization of IDS’s
Clustering in intrusion detection
IDS’s make extensive use of AI techniques to improve their ability to detect attacks on computer systems.
CONCLUSION:
Intrusion detection is still a fledging field of research. However, it is beginning to assume enormous importance in today’s computing environment. The combination of facts such as the unbridled growth of the internet, the vast financial possibilities opening up in electronic trade, and the lack of truly secure systems make it an important and pertinent field of research. Future research trends seem to be converging towards a model that is a hybrid of the anomaly and misuse detection models; it is slowly acknowledged that neither of the models can detect all intrusion attempts on their own.
    We have proved the need for IDS and discussed its classification. The major classification is into anomaly and misuse detections, we have gone briefly into the different techniques used in anomaly detection systems. Some of them are statistical approaches, predictive pattern generation and usage of neural networks. We have also discussed about the misuse detection systems like keystroke monitoring, model based intrusion detection, state transition analysis and pattern matching.
    we have provided a brief survey of AI methods used in a variety of IDSs. We dealt with the need of data reduction for intrusion detection and the methods of data filtering, types of data filtering like feature selection and data clustering. We described the behaviour classification in intrusion detection using expert systems and rule based induction. We have also shown how one technique, feature selection, can be used to reduce overhead and improve classification of network connections. 

mobile computing


                                                            MOBILE COMPUTING                                                              



ABSTRACT:-

            
      Technology has developed rapidly over the last twenty years. This development in technology resulted in the development of communication. For example, Internet, email, Voicemail, etc. This development has still not given the user the freedom to access data anywhere or anytime he wants because of the limitations like the change in location resulted in either routing problems or connection breaks.

            The advent of MOBILE COMPUTING has given birth to hopes of overcoming the above limitations. These mobile networks have facilitated communication anywhere in the world at any time. The word MOBILE itself illustrated what it does. These mobile networks provide communication even when the source and destination are constantly changing their location.
                               

 INTRODUCTION:-

 
           Don Ring of Bell Labs, USA in 1947, invented the cellular concept. The first commercial mobile communications were in the form of radio paging networks. Advanced Mobile Phone System (AMPS) is a major cellular networks established in America using analog cellular technology. Total Access Communication System (TACS) is a major system use in Europe. Recently a number of digital communications are also introduced. The present trend is to cover communications anywhere in the world and at any time of the day. Cellular concept based on the concept of network of cells, which covers a large geographical area to communicate over the world.

  Mobile Computing is a program that allows user to access wireless network. This is done by using Radio Frequency (RF) technology to transmit data through the air without wired cabling. Mobile Computing provides all the same features and benefits of the existing campus network, but without the limitations of being tethered to a cable.
The goals of this service are to provide expanded wireless coverage for the campus, provide access to wireless monitor usage and solicit feedback in order to determine scope and scale of future expansion.

 IMPORTANCE OF MOBILE COMPUTERS:-

Mobile Computing is becoming increasingly important due to the rise in the number of portable computers and the desire to have continuous network connectivity to the Internet irrespective of the physical location of the node. The Internet infrastructure is built on top of a collection of protocols, called the TCP/IP protocol suite. The Mobile Internet Protocol (Mobile IP) is an extension to the Internet Protocol proposed by the Internet Engineering Task Force (IETF) . It enables mobile computers to stay connected to the Internet regardless of their location and without changing their IP address. More precisely, Mobile IP is a standard protocol that builds on the Internet Protocol by making mobility transparent to applications and higher level protocols like TCP. 

     




 

 

 

 

HOW MOBILE IP WORKS:-


IP routes packets from a source endpoint to a destination by allowing routers to forward packets from incoming network interfaces to outbound interfaces according to routing tables. The routing tables typically maintain the next-hop (outbound interface) information for each destination IP address, according to the number of networks to which that IP address is connected. The network number is derived from the IP address by masking off some of the low-order bits. Thus, the IP address typically carries with it information that specifies the IP node's point of attachment.

To maintain existing transport-layer connections as the mobile node moves from place to place, it must keep its IP address the same. In TCP (which accounts for the overwhelming majority of Internet connections), connections are indexed by a quadruplet that contains the IP addresses and port numbers of both connection endpoints. Changing any of these four numbers will cause the connection to be disrupted and lost. On the other hand, correct delivery of packets to the mobile node's current point of attachment depends on the network number contained within the mobile node's IP address, which changes at new points of attachment. To change the routing requires a new IP address associated with the new point of attachment.

Mobile IP has been designed to solve this problem by allowing the mobile node to use two IP addresses (see the sidebar "Mobile Networking Terminology" for definitions of italicized terms). In Mobile IP, the home address is static and is used, for instance, to identify TCP connections. The care-of addresses changes at each new point of attachment and can be thought of as the mobile node's topologically significant address; it indicates the network number and thus identifies the mobile node's point of attachment with respect to the network topology. The home address makes it appear that the mobile node is continually able to receive data on its home network, where Mobile IP requires the existence of a network node known as the home agent. Whenever the mobile node is not attached to its home network (and is therefore attached to what is termed a foreign network), the home agent gets all the packets destined for the mobile node and arranges to deliver them to the mobile node's current point of attachment.

Whenever the mobile node moves, it registers its new care-of address with its home agent. To get a packet to a mobile node from its home network, the home agent delivers the packet from the home network to the care-of address. The further delivery requires that the packet be modified so that the care-of address appears as the destination IP address. This modification can be understood as a packet transformation or, more specifically, a redirection. When the packet arrives at the care-of address, the reverse transformation is applied so that the packet once again appears to have the mobile node's home address as the destination IP address. When the packet arrives at the mobile node, addressed to the home address, it will be processed properly by TCP or whatever higher level protocol logically receives it from the mobile node's IP (that is, layer 3) processing layer.


DIFFERENT TYPES OF MOBILE SYSTEMS:-

                In many ways mobile computing has several characteristics of distributed systems. Here we explain the different types of distributed systems ranging from the traditional type to nomadic, ad-hoc and finally ubiquitous ones.
TRADITIONAL DISTRIBUTED SYSTEMS
            Traditional distributed systems consists of a collection of fixed hosts that are themselves attached to a network- if hosts are disconnected from the network this is considered to be abnormal whereas in a mobile system this is quite the norm. These hosts are fixed. The bandwidth in traditional systems is very high too.
            The execution context is said to be static as opposed to a dynamic context whereby host joined and leave the network frequently. in a traditional system ,location rarely changes as well and hosts are much less likely to be added or deleted from the network
   Traditional distributed systems also need to guarantee non-functional requirements such as scalability, openness, heterogeneity, fault tolerance and finally resource sharing.
NOMADIC DISTRIBUTED SYSTEM
This kind of system is composed of a set of mobile devices and a core infrastructure with fixed and wired nodes. Mobile devices move from location to location while maintaining a connection to the fixed network. There are problems that arise from such shifts in location. The mobile host has a home IP address and thus any packets sent to mobile host will be delivered to the home network and not the foreign network where the mobile host is currently located. Such problem can be solved by forwarding packets to the foreign network with the help of mobile IP.
            These systems are susceptible to the uncertainty of location, a repeated lack of connections and the migration into different physical and logical environments while operating. However, compared to ad-hoc networks, nomadic systems still have comparatively reliable connections and services since most of these are actually supported by the fixed infrastructure of the network.
AD-HOC MOBILE DISTRIBUTED SYSTEM
Ad-hoc distributed systems are possibly the only type of network that comes close to mobile networks in the sense that every node is literally mobile.  It is these networks 0that are very much seen as the systems of the future, whereby hosts are connected to the network through high-variable quality links) e/g/ from GPS to broadband connection) and executed in an extremely dynamic environment
Ad-hoc systems do not have any fixed infrastructure which differs them both from traditional and nomadic distributed systems.  In fact, ad-hoc networks may come together as needed, not necessarily with any assistance from the existing (e.g. Internet) infrastructure.  When nodes are detached from the fixed/mobile network they may evolve independently and groups of hosts opportunistically from “clusters” of mini-networks.  The speed and ease of deployment make ad-hoc networks highly desirable.
THEORY IN MOBILE COMPUTERS:-
The trends of two fields related to mobile computing are
* MODELS
            Models permit the precise description of existing languages and system semantics.  In fact, they enable the formal reasoning about the correctness of such semantics.  Models are very much used to emphasize parallels and distinctions among various forms of mobility (logical and physical) and are concerned with the formulation of appropriate abstractions useful in specification and evaluation of such mobile systems

Models are mainly concerned with the characteristics of mobile units such as the unit of mobility (who is allowed to move), its location (where a mobile unit is positioned in space) and its context (determined by the current location of mobile units).  There are many existing models are many more are still in research.

·         Random mobility models(s)
·         Markovian model
·         Exponential Correlated Random Model
·         Nomadic Community Model.

*ALGORITHMS
       The current algorithms applied reflect the assumptions that are made about the underlying system.  Unfortunately, many of these assumptions are not suited for current algorithms for mobile systems.  Mobile algorithms are obliged to treat in much detail space and coordination of mobile systems.  In particular, algorithms have to carefully take into consideration location changes, the frequency of disconnection, power limitations and the dynamic changes in the connectivity pattern of mobile systems.  This field of theory is in fact spread among a vast spectrum of research due to the large diversity of mobile systems.

 

APPLICATIONS:-

   
The application areas of mobile technology include
  • Consumer Goods
  • Delivery and Route Sales
  • Government
  • Healthcare
  • Market Research
  • Pharmaceuticals
  • Transportation and
  • Utilities

 BENEFITS:-


         The benefits of automating data collection applications with mobile computing are the reduction of hard and soft costs, enhancement of revenue potential, and a distinct competitive advantage through:

  • improving the data collection process
  • improving data accuracy
  • facilitating collection of more useful information
  • eliminating redundant data entry
  • improving information flow
  • providing access to previously unavailable information
  • Reduced radio congestion. 
  • Improved supervision and resource management. 
  • Less time in data transformation.   
                             

LIMITATIONS:-

           Range & Bandwidth: Mobile Internet access is generally slower than direct cable connections, using technologies such as GPRS and EDGE, and more recently HSDPA and HSUPA 3G and 4G networks. These networks are usually available within range of commercial cell phone towers. Higher speed wireless LANs are inexpensive but have very limited range.

  • Security standards: When working mobile, one is dependent on public networks, requiring careful use of VPN. Security is a major concern while concerning the mobile computing standards on the fleet. One can easily attack the VPN through a huge number of networks interconnected through the line.
  • Power consumption: When a power outlet or portable generator is not available, mobile computers must rely entirely on battery power. Combined with the compact size of many mobile devices, this often means unusually expensive batteries must be used to obtain the necessary battery life.
  • Transmission interferences: Weather, terrain, and the range from the nearest signal point can all interfere with signal reception. Reception in tunnels, some buildings, and rural areas is often poor.
  • Potential health hazards: People who use mobile devices while driving are often distracted from driving and are thus assumed more likely to be involved in traffic accidents.[3] (While this may seem obvious, there is considerable discussion about whether banning mobile device use while driving reduces accidents or not.[4][5]) Cell phones may interfere with sensitive medical devices. Questions concerning mobile phone radiation and health have been raised.
  • Human interface with device: Screens and keyboards tend to be small, which may make them hard to use. Alternate input methods such as speech or handwriting recognition require training.

In-vehicle computing and fleet computing:-

Many commercial and government field forces deploy a ruggedized portable computer with their fleet of vehicles. This requires the units to be anchored to the vehicle for driver safety, device security, and ergonomics. Rugged computers are rated for severe vibration associated with large service vehicles and off-road driving and the harsh environmental conditions of constant professional use such as in emergency medical services, fire, and public safety.
 Typical fan-based cooling has stated limits of 95F-100F of ambient temperature, and temperatures below freezing require localized heaters to bring Several specialized manufacturers such as First Mobile Technologies, National Products Inc (Ram Mounts), Gamber Johnson and LedCo build mounts for vehicle mounting of computer equipment for a wide range of vehicles. The mounts are built to withstand the harsh conditions and maintain ergonomics.
Specialized installation companies design the mount design, assembling the parts, and installing them in a safe and consistent manner away from airbags, vehicle HVAC controls, and driver controls. Frequently installations will include a WWAN modem, power conditioning equipment, transceiver antennae mounted external to the vehicle, and WWAN/WLAN/GPS/etc.

 

 

SECURITY ISSUES:-

Mobile security or mobile phone security has become increasingly important in mobile computing. It is of particular concern as it relates to the security of personal information now stored on the smartphone.
More and more users and businesses use smartphones as communication tools but also as a means of planning and organizing their work and private life. Within companies, these technologies are causing profound changes in the organization of information systems and therefore they have become the source of new risks. Indeed, smartphones collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user and the intellectual property of the company.
All smartphones, as computers, are preferred targets of attacks. These attacks exploit weaknesses related to smartphones that can come from means of communication like SMS, MMS, wifi networks, and GSM. There are also attacks that exploit software vulnerabilities from both the web browser and operating system. Finally, there are forms of malicious software that rely on the weak knowledge of average users.
Different security counter-measures are being developed and applied to smartphones, from security in different layers of software to the dissemination of information to end users. There are good practices to be observed at all levels, from design to use, through the development of operating systems, software layers, and downloadable apps.

CONCLUSION:


This paper discusses every aspect for designing the mobile device in detail and I would like to draw attention of these issues while designing a mobile device or the device that going to be part of mobile computing domain.
At this stage we are facing different types of problems and threats to the mobile industry, the two major aspects are the security and the usability issue.