Protecting Users from Malicious Mobile Apps: A Comprehensive Security Guide for Common Users
DOI:
https://doi.org/10.32628/CSEIT241061227Keywords:
Mobile Security, Malicious Applications, Threat Detection, User Protection Strategies, Security Best PracticesAbstract
This comprehensive article addresses the critical issue of malicious mobile native applications and their impact on user security. The article explores the evolving landscape of mobile threats, examining various categories of malicious apps and their sophisticated attack mechanisms. It analyzes threat impacts across multiple dimensions, including personal data theft, financial losses, privacy violations, and device performance degradation. The article presents a multi-layered approach to user protection, encompassing pre-installation verification, installation safety measures, and post-installation monitoring strategies. The article evaluates the effectiveness of platform-specific security tools and best practices for ongoing protection, comparing security measures across Android and iOS ecosystems. By analyzing current trends and protection mechanisms, this paper offers valuable insights for common users to enhance their mobile security posture and minimize the risk of compromise from malicious applications. The findings demonstrate the importance of implementing comprehensive security measures and maintaining vigilant security practices in the mobile computing native environment.
Downloads
References
Guardsquare, "Fake Mobile Apps: A Growing Threat," https://www.guardsquare.com/blog/fake-mobile-apps-growing-threat-2019
Lookout., "Mobile Threat Landscape Report: Q1 2024," https://www.lookout.com/threat-intelligence/report/q1-2024-mobile-landscape-threat-report
Jayesh V Jawade, "Phishing Website Detection Using Fast.ai Library," https://ieeexplore.ieee.org/document/9510059
Jason Nikolai; Yong Wang, "A System for Detecting Malicious Insider Data Theft in IaaS Cloud Environments," https://ieeexplore.ieee.org/document/7841554
IEEE Xplore, "IEEE Transactions on Privacy," IEEE Software, Volume: 41, Issue: 4, July-Aug. 2024, https://ieeexplore.ieee.org/document/10547604
Yue Hu, "User Privacy Protection Strategy under Mobile Peer-to-Peer Network Propagation Environment," https://ieeexplore.ieee.org/document/9723948
Emmanuel Hooper et al., "Intelligent strategies and techniques for effective cyber security, infrastructure protection and privacy," https://ieeexplore.ieee.org/document/5402581
Shivi Garg, "Comparative analysis of Android and iOS from security viewpoint," https://www.researchgate.net/publication/349331819_Comparative_analysis_of_Android_and_iOS_from_security_viewpoint
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Scientific Research in Computer Science, Engineering and Information Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.