What email address or phone number would you like to use to sign in to Docs.com?
If you already have an account that you use with Office or other Microsoft services, enter it here.
Or sign in with:
Signing in allows you to download and like content, and it provides the authors analytical data about your interactions with their content.
Embed code for: Effect of cell phone on security
Select a size
that is brief research on the topic of effects of cell phone in security.
Effects Of Cell Phone in Security
Sending messages that contain dangerous attachments (e.g. malware) with text that encourage people to open the attachments.
Pretending to be the main administrator of a local network and asking for the victim’s password in order to perform a maintenance check
Telling a victim over the phone that he/she has won a prize, in return they ask for a credit card number to deliver it
o Asking for a user’s password for a certain Internet service, such as a blog, and later use the same password to access user’s computer. This technique works because users often use the same passwords for many different portals
SMiShing (SMS phishing) has continued to grow in popularity as a social engineering tool for cybercriminals.
The aim of SMiShing is to trick the user into clicking on a link in a text message; that link goes to a page prompting you to enter personal data.
The objective is to gain access to sensitive information like usernames and passwords. Additionally, many SMiShing messages will include links with malware waiting on the other side for anyone who clicks on them.
Often the SMiShing attempt is easy to spot, with claims that you have won a contest you never entered or an “unclaimed refund” waiting for you.
Many of the same techniques
used in phishing email have made their way over to the SMiShing world
Countries with Most Phishing Websites
Unifying the Global Response to Cybercrime
Financial fraud is a criminal behavior in which a person uses wrong methods to trick a
victim out of his money.
The Internet fraud scheme is a common example of financial fraud, which includes emulated
online sales, retail schemes, business opportunity schemes, identity theft, market manipulation
schemes, and credit card schemes.
Now a day’s mobile phones are used to perform such kind of activities.
The vast majority of this type of fraud involves the use of card details that have been
fraudulently obtained through methods such as unsolicited emails or telephone calls
or digital attacks such as malware and data hacks.
The card details are then used to undertake fraudulent purchases over the internet,
phone or by mail order. It is also known as ‘card-not-present’ (CNP) fraud.
Cell Phone Theft in Punjab
Illegal Sim Card
Criminals do threat for Demand money for the return of a captured person Extortion.
Extortion is a crime in which one person forces another person to do something against his will, generally to give up money or other property, by threat of violence, property damage, damage to the person’s reputation, or extreme financial hardship. Extortion involves the victim’s consent to the crime, but that consent is obtained illegally.
Illegal Issue of Sim Cards
As we see that No Of mobile users increase day by day but some time they use the Illegal sim card.
As we know that if we take the illegal sim card there is no information about the users.
Illegal sim card is too much easy to take in Pakistan in back 2, 3 years ago.
At that time the amount of terrorist attack increate at larger amount and any other illegal activities there is no information about the user who uses the card so that person can take part in many other illegal issues related to security. But PTA look after these issues and overcome the illegal issues of the sim card using the biometric thumb scan
Four kinds of devices have been used in bombs attacks – remote controls, mobile phones, timers and manual bombs. Terrorists connects bombs with the mobile phones. Mobile-phone-controlled devices are often used during processions that take time so they can fix the device according to the procession’s schedule. In such cases, the terrorists have an advantage that they can detonate the bomb from any part of the world
Up to three years’ imprisonment, Rs.1 million fine or both for unauthorized access to critical infrastructure information system or data.
Up to seven years, Rs10 million fine or both for interference with critical infrastructure information system or data with dishonest intention.
Up to seven years, Rs10 million fine or both for glorification of an offence relating to terrorism, any person convicted of a crime relating to terrorism or proscribed individuals or groups. Glorification is explained as “depiction of any form of praise or celebration in a desirable manner”.
Up to six months’ imprisonment, Rs50 thousand or both for producing, making, generating, adapting, exporting, supplying, offering to supply or importing a device for use in an offence.
Up to three years’ imprisonment, Rs5 million fine or both for obtaining, selling, possessing, transmitting or using another person’s identity information without authorization .
If your identity information is used without authorization, you may apply to the authorities to secure, destroy or prevent transmission of your information.
1. The Express Tribune, September 9th, 2015.
2. Annual Report 2015-2016, Pakistan Telecommunication Authority
3. Mobile Threat Report (What’s on the Horizon for 2016), Intel
5. Phishing Activity Trends Report 1st Quarter 2016, January – March 2016 Published May 23, 2016, Unifying the Global Response to Cybercrime, APWG
6. Fraud the Facts 2016, Financial Fraud Action
7. FIA Cyber Crime Office, Lahore 8. Cyber Crime Bill,2016
BS computer Science
Department Of Computer Science
Dr Freeha Zafar
Ph.D. Computer Science (England)
M.Phil. Computer Science (England)
MSc Computer Science (UCP)
CCNA, CCNP, CCIE, CCIP, C-voice
Up to three years’ imprisonment, Rs.1 million fine or both for unauthorized access to critical infrast