University of Hertfordshire

By the same authors

Mobile devices: A phisher's paradise

Research output: Chapter in Book/Report/Conference proceedingConference contribution

View graph of relations
Original languageEnglish
Title of host publicationSECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Part of ICETE 2014 - 11th International Joint Conference on e-Business and Telecommunications
EditorsMohammad S. Obaidat, Andreas Holzinger, Pierangela Samarati
PublisherSciTePress
Pages79-87
Number of pages9
ISBN (Electronic)9789897580451
DOIs
Publication statusPublished - 2014
Event11th International Conference on Security and Cryptography, SECRYPT 2014 - Part of 11th International Joint Conference on e-Business and Telecommunications, ICETE 2014 - Vienna, Austria
Duration: 28 Aug 201430 Aug 2014

Publication series

NameSECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Part of ICETE 2014 - 11th International Joint Conference on e-Business and Telecommunications

Conference

Conference11th International Conference on Security and Cryptography, SECRYPT 2014 - Part of 11th International Joint Conference on e-Business and Telecommunications, ICETE 2014
Country/TerritoryAustria
CityVienna
Period28/08/1430/08/14

Abstract

Mobile devices - especially smartphones - have gained widespread adoption in recent years, due to the plethora of features they offer. The use of such devices for web browsing and accessing email services is also getting continuously more popular. The same holds true with other more sensitive online activities, such as online shopping, contactless payments, and web banking. However, the security mechanisms that are available on smartphones and protect their users from threats on the web are not yet mature, as well as their effectiveness is still questionable. As a result, smartphone users face increased risks when performing sensitive online activities with their devices, compared to desktop/laptop users. In this paper, we present an evaluation of the phishing protection mechanisms that are available with the popular web browsers of Android and iOS. Then, we compare the protection they offer against their desktop counterparts, revealing and analyzing the significant gap between the two.

ID: 22840724