Technology challenging technology: In today’s cellular world where there are huge technological advancements occurring, the advanced technology is becoming a challenge for the cellular industry. Cell phone viruses are not new, but in the near future they may lead to heavy complications.
The recent news of the apple iphone is that it was easy for the hackers and the government to conduct a secret surveillance of the user. This has created waves in the cellular world. This event has attributed for many doubts to rise in our minds. This event has posed an alarm about the threats and the urgency required in making the necessary precautions against these threats.
Threats
Cell phones, in the recent years have become a scaled down computers and they can take the advantages of the efforts which are been made to keep the personal computers safe like using an antivirus software. Though some problems can be solved, cell phones have their own set of problems. Mobile phones can be easily lost or can even be stolen. Even they could be accessed through different methods and it may be done in different ways like through cellular network or blue tooth or even by wi-fi.
Technological Developments-Positive Note
Necessary technological developments are coming into picture in the aspect of the security of the mobile phone. The security hardware in a mobile is mainly of two kinds. It offers an extra processor and also extra memory which is meant for different tasks. The hardwire system works by dividing the phone into two different environments. The user has the access to a part of the environment which has all the applications. The other part is designed in the manner that it is purely impenetrable to the virus and the harmful software. The critical information like the passwords are stored in this part of the mobile. So by taking this precaution, even when any virus attack occurs, it doesn’t have the access to the data.
Though the hardware with this kind of security could have its benefits for the users, others doubts also are arising like who would be having the access to the hardware. Even questions are arising on whether the users will be having the proper control of their devices or not.
Conclusion
The best remedy could be if the companies when combining with the software creators can solve many of the issues. Though it may seem a better option, it is a bit expensive process. Though the targeting of the cellular phones by the hackers and the possibilities of the virus attacks in the cellular industry is not a big concern right now because the industry is broken into many different service providers and software and hardware manufacturers. But still due to the developing technology, the cellular industry may be attacked in the recent future.
The recent news of the apple iphone is that it was easy for the hackers and the government to conduct a secret surveillance of the user. This has created waves in the cellular world. This event has attributed for many doubts to rise in our minds. This event has posed an alarm about the threats and the urgency required in making the necessary precautions against these threats.
Threats
Cell phones, in the recent years have become a scaled down computers and they can take the advantages of the efforts which are been made to keep the personal computers safe like using an antivirus software. Though some problems can be solved, cell phones have their own set of problems. Mobile phones can be easily lost or can even be stolen. Even they could be accessed through different methods and it may be done in different ways like through cellular network or blue tooth or even by wi-fi.
Technological Developments-Positive Note
Necessary technological developments are coming into picture in the aspect of the security of the mobile phone. The security hardware in a mobile is mainly of two kinds. It offers an extra processor and also extra memory which is meant for different tasks. The hardwire system works by dividing the phone into two different environments. The user has the access to a part of the environment which has all the applications. The other part is designed in the manner that it is purely impenetrable to the virus and the harmful software. The critical information like the passwords are stored in this part of the mobile. So by taking this precaution, even when any virus attack occurs, it doesn’t have the access to the data.
Though the hardware with this kind of security could have its benefits for the users, others doubts also are arising like who would be having the access to the hardware. Even questions are arising on whether the users will be having the proper control of their devices or not.
Conclusion
The best remedy could be if the companies when combining with the software creators can solve many of the issues. Though it may seem a better option, it is a bit expensive process. Though the targeting of the cellular phones by the hackers and the possibilities of the virus attacks in the cellular industry is not a big concern right now because the industry is broken into many different service providers and software and hardware manufacturers. But still due to the developing technology, the cellular industry may be attacked in the recent future.
No comments:
Post a Comment