Bridging the Air Gap between Isolated Networks and Mobile Phones in a Practical Cyber-Attack

2017 ◽  
Vol 8 (4) ◽  
pp. 1-25 ◽  
Author(s):  
Mordechai Guri ◽  
Matan Monitz ◽  
Yuval Elovici
Keyword(s):  
Air Gap ◽  
2017 ◽  
Vol 2 (11) ◽  
pp. 8-16
Author(s):  
Moses Ashawa ◽  
Innocent Ogwuche

The fast-growing nature of instant messaging applications usage on Android mobile devices brought about a proportional increase on the number of cyber-attack vectors that could be perpetrated on them. Android mobile phones store significant amount of information in the various memory partitions when Instant Messaging (IM) applications (WhatsApp, Skype, and Facebook) are executed on them. As a result of the enormous crimes committed using instant messaging applications, and the amount of electronic based traces of evidence that can be retrieved from the suspect’s device where an investigation could convict or refute a person in the court of law and as such, mobile phones have become a vulnerable ground for digital evidence mining. This paper aims at using forensic tools to extract and analyse left artefacts digital evidence from IM applications on Android phones using android studio as the virtual machine. Digital forensic investigation methodology by Bill Nelson was applied during this research. Some of the key results obtained showed how digital forensic evidence such as call logs, contacts numbers, sent/retrieved messages, and images can be mined from simulated android phones when running these applications. These artefacts can be used in the court of law as evidence during cybercrime investigation.


Succeeding the entrustment of the personal computer by Ed Roberts in 1975, the absolute first virus became known to exist in a trifling time span of six years. The adversary was called Elk Cloner. Not long before they established themselves as adverse. Forthwith, attacks become frequent by the clock at all levels possible. It is a direct indication to how important cyber security is considering the prolonging effect and enormous expansion caused by such events in recent years. Another major issue is the huge scale arrangement of gadgets with almost no security or a wide default security design susceptible to cyber-attack. Cyber security is swiftly transforming into an article of everyday usage. As attacks are becoming sophisticated, we expect gadgets like advanced mobile phones, PCs and significantly progressively computerized frameworks to be secure and the protection of the data to be fundamental. Our paper explores the variety of Cyber Attacks, their methodologies and core ideas with the motivations behind it, also the ways to circumvent the threats by putting lights on the ongoing and future technologies to tackle advanced threats.


Pathology ◽  
2001 ◽  
Vol 33 (3) ◽  
pp. 269-270
Author(s):  
Clive G. Harper ◽  
Victor K. Lee
Keyword(s):  

2014 ◽  
Vol 35 (3) ◽  
pp. 158-165 ◽  
Author(s):  
Christian Montag ◽  
Konrad Błaszkiewicz ◽  
Bernd Lachmann ◽  
Ionut Andone ◽  
Rayna Sariyska ◽  
...  

In the present study we link self-report-data on personality to behavior recorded on the mobile phone. This new approach from Psychoinformatics collects data from humans in everyday life. It demonstrates the fruitful collaboration between psychology and computer science, combining Big Data with psychological variables. Given the large number of variables, which can be tracked on a smartphone, the present study focuses on the traditional features of mobile phones – namely incoming and outgoing calls and SMS. We observed N = 49 participants with respect to the telephone/SMS usage via our custom developed mobile phone app for 5 weeks. Extraversion was positively associated with nearly all related telephone call variables. In particular, Extraverts directly reach out to their social network via voice calls.


2011 ◽  
Author(s):  
Christopher S. Walsh ◽  
Tom Power
Keyword(s):  

2006 ◽  
Author(s):  
Alessandra Preziosa ◽  
Marta Bassi ◽  
Daniela Villani ◽  
Andrea Gaggioli ◽  
Giuseppe Riva

Sign in / Sign up

Export Citation Format

Share Document