Below are some of the most common types of Wireless and Mobile Device Attacks:
Smishing become common now as smartphones are widely used. SMiShing uses Short Message Service (SMS) to send fraud text messages or links. The criminals cheat the user by calling. Victims may provide sensitive information such as credit card information, account information, etc. Accessing a website might result in the user unknowingly downloading malware that infects the device.
War driving :
War driving is a way used by attackers to find access points wherever they can be. With the availability of free Wi-Fi connection, they can drive around and obtain a very huge amount of information over a very short period of time.
WEP attack :
Wired Equivalent Privacy (WEP) is a security protocol that attempted to provide a wireless local area network with the same level of security as a wired LAN. Since physical security steps help to protect a wired LAN, WEP attempts to provide similar protection for data transmitted over WLAN with encryption.
WEP uses a key for encryption. There is no provision for key management with Wired Equivalent Privacy, so the number of people sharing the key will continually grow. Since everyone is using the same key, the criminal has access to a large amount of traffic for analytic attacks.
WPA attack :
Wi-Fi Protected Access (WPA) and then WPA2 came out as improved protocols to replace WEP. WPA2 does not have the same encryption problems because an attacker cannot recover the key by noticing traffic. WPA2 is susceptible to attack because cyber criminals can analyze the packets going between the access point and an authorized user.
Bluejacking is used for sending unauthorized messages to another Bluetooth device. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers and other devices.
Replay attacks :
In Replay attack an attacker spies on information being sent between a sender and a receiver. Once the attacker has spied on the information, he or she can intercept it and retransmit it again thus leading to some delay in data transmission. It is also known as playback attack.
It occurs when the attacker copies the victim’s information from his device. An attacker can access information such as the user’s calendar, contact list, e-mail and text messages without leaving any evidence of the attack.
RF Jamming :
Wireless signals are susceptible to electromagnetic interference and radio-frequency interference. Radio frequency (RF) jamming distorts the transmission of a satellite station so that the signal does not reach the receiving station.
Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.
- Differences between Wireless Adhoc Network and Wireless Sensor Network
- Challenge In Mobile Device
- Securing wireless and mobile devices
- Traditional wireless mobile communication
- Wireless/Mobile Computing Technologies
- Types of DNS Attacks and Tactics for Security
- Types of firewall and possible attacks
- Types of Email Attacks
- Types of Digital Signature Attacks
- Types of DOS attacks
- Types of Cyber Attacks
- Mobile Internet Protocol (or Mobile IP)
- Active and Passive attacks in Information Security
- Basic Network Attacks in Computer Network
- Bridges (local Internetworking device)
- Advantages and disadvantages of Wireless Communication
- Collision Avoidance in wireless networks
- Modes of Wireless Connectivity
- Wireless Local Loop
- Wireless Application Protocol