Affiliation:
1. Capitol Technology University, USA
Abstract
With the increasing reliance on mobile devices for various purposes, the threat of mobile ransomware has escalated, jeopardizing sensitive information, financial data, and even the functionality of these devices. This chapter aims to provide a comprehensive understanding of the characteristics of mobile ransomware, its potential impacts, and the importance of implementing effective security measures to safeguard mobile devices from these attacks. The general problem addressed in this study is the underestimation of mobile ransomware as a threat due to current security controls and policies. Many organizations fail to recognize the severity of this issue, leading to a lack of proper security controls and policies regarding their mobile devices. Consequently, mobile ransomware becomes an active threat vector, putting organizations and individuals at risk.
Reference67 articles.
1. Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions
2. Android botnets: A serious threat to android devices.;S.Anwar;Pertanika Journal of Science & Technology,2018
3. Bortniker, J. (2016). Malware analysis for cyber-threat intelligence [dissertation].
4. Bullock, L. (2019, January 21). The future of byod: Statistics, predictions and best practices to prep for the future. Forbes.https://www.forbes.com/sites/lilachbullock/2019/01/21/the-future-of-byod-statistics-predictions-and-best-practices-to-prep-for-the-future/
5. Talos: no more ransomware victims with formal methods