Abstract [eng] |
The popularity of mobile phones is rapidly increasing and society is no longer able to imagine their lives without it. An incredible amount of operations and data transfers occur every day, which also results in many scammers, who want to intercept it. Not only do they use emails, messages and calls, but malicious applications as well. The progress of technology made them even more dangerous. Since the information they can gather from the Internet about the people increased the effectivness of their methods, it is imperative that defense mechanisms are created. This work talks about the phone’s small size, limitations, restricted resources and the way operating systems manage them. In addition to that, the human factor, users’s behaviour, their habits and the loss of focus are taken into the consideration. Moreover, it includes static, heuristic defensive measures, the disadvantages of automatic ones and usability and security evalution of user interface changing methods. The inferior design leads to more people being affected by the attacks. The improvements, such as an inclusion of sound recordings, pictures and the possibility to save them in the database, increased personal security signs method’s level of proficiency in defending against the phishing and promoted people’s awareness. |