Cell Phones Security : Emerging Threats, Essential Strategies

Ritika Saroha, Sarika Choudhary, Yatan Dahiya


The Cellular phones have become important tools in today's modern lifestyle. These are small in size and are relatively inexpensive. Earlier cell phones can be used only for voice calls, simple text messages, and Personal Information Management (PIM) (e.g. phonebook, calendar).While cell phones provide productivity benefits, they also pose new risks to organizations. This document gives details about the threats and technology risks associated with the use of cell phones and the available safeguards to make these risks comparatively less effective. Organizations can use this information to enhance security and reduce incidents involving cellular phones.


Malware, Spam, Cloning, Wi-Fi, Spoofing

Full Text:



  • There are currently no refbacks.