TY - JOUR T1 - The Role of Software Telephone Bugs in Mobile Security AU - Igor, Zhukov AU - Sergey, Kharkov AU - Dmitry, Mikhaylov AU - , KholyavinVitaliy AU - Igor, Nasenkov JO - International Journal of Soft Computing VL - 11 IS - 1 SP - 1 EP - 3 PY - 2016 DA - 2001/08/19 SN - 1816-9503 DO - ijscomp.2016.1.3 UR - https://makhillpublications.co/view-article.php?doi=ijscomp.2016.1.3 KW - malicious logic KW -mobile device vulnerabilities KW -Software bug KW -unauthorized access KW -action AB - Nowadays mobile device manufacturers offer customers not only devices for calling and sending text messages but also multi-functional smartphones with much broader capability. They can store and process a lot of data that may be breached by theft or data leakage. This study deals with the overview of the main attacks that can be performed using the vulnerabilities of a mobile device with inserted software bug. This bug can force the phone to send text messages, make calls on paid numbers and record them, get access to private information (list of contacts, text) as well as harm the operating system. Researchers also provide the basic recommendation the following of which will protect the user from the unlawful action of an intruder using the malicious logic. The overview can be used to improve existing mobile security means. ER -