This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.
This research paper explains the Smartphone warms and viruses using Android. Viruses, hackers and spam they are not only for laptop or desktop commuters. Internet security experts said "they could be well on their way into your pocket or purse". As we know the Smartphone has become more popular like Blackberry, Palm, iPhone etc."It's guaranteed that almost everything we see on a computer will show up on a Smartphone and some new things," said Jake Widman, a San Francisco-based technology writer and analyst. After the planning of apple to release iPhone technology in China, and also some other affordable android based handsets to target the market. A big pool of potential targets is expecting on Apple products in the shape of warms & viruses on Smartphone's. And if we compare it with last year condition when analysts said that people use Smartphone just for voice calls or email surfing.
Andrew Storm Said when market is growing a pool of people going after because there will be several sources as a potential for gaining purpose. It is said by Andrew Storms who is directing safety efforts at online security company nCircle.
"What we haven't seen is the massive anonymous attacking across all of the Smartphone bases," Storms said. "[Traditional] worms and viruses continue to breed and move on from computer to computer"
A survey by security firm Trend Micro Incorporated suggested that only 23 percent of Smartphone users enable security software already loaded onto their phones and 44 percent think surfing the Internet on their phone is as safe or safer than doing so on a desktop computer -- even with no security software.
The good news, experts say, is that phones present problems for hackers and other bad guys that traditional computers don't.
Most viruses and other malware are designed for Windows, because that's the most popular operating system. Since Smartphone use a variety of different platforms, someone writing malicious software needs to pick and choose.
And while e-mail databases exist that enable phishes, spammers and others to blast their messages to huge chunks of users at once, it's tougher to get lists of telephone numbers, much less numbers specifically for Smartphone users.
AÂ SmartphoneÂ is aÂ mobile phoneÂ built on aÂ mobile operating system, having more mobile computing capabilities and also some other features. Many modern Smartphone's also include high-resolutionÂ touch screensÂ andÂ web browsersÂ that display standard web pages as well asÂ mobile-optimizedÂ sites. High-speed data access is provided byÂ Wi-FiÂ andÂ Mobile Broadband. The mobile operating system(OS) used by most modern smartphones. TheÂ mobile operating systemsÂ (OS) used by modern Smartphone's includeÂ Google'sÂ Android,Â Apple'sÂ iOS,Â Nokia'sÂ Symbian,Â RIM'sÂ BlackBerryOS,Â Samsung'sÂ Bada,Â Microsoft's Windows Phone,Â Hewlett-Packard'sÂ webOS, andÂ embedded LinuxÂ distributions such asÂ MaemoÂ andÂ MeeGo. Such operating systems can be installed on many different phone models, and typically each device can receive multiple OS software updates over its lifetime. As Smartphone's become more and more popular, and their connectivity and processing power increase, they are attracting more attention from malware writers around the world.
"A big tree attracts the woodsman's axe."Â
English proverb. Computer security experts have predicted since 2009Â that viruses (actually "malware", which describes all types of malicious software) will hit Smartphone's.
One of the problems now, analysts say, is that people who take security precautions on their home computers either forget to do so with their phones or don't think they need to in the first place.
"We've not become accustomed to thinking twice about it," Storms said. "The risk exists. It's going to continue to exist and continue to increase." Smartphone Mobile device containing both cellular components and Internet access, with powerful computing components similar to those found on desktop PC's Smartphone Operating Systems (OS) "covered" in this paper: Symbian, Windows Mobile/PocketPC, Palm, and embedded Linux. It appears that 2011 will be the year of Smartphone viruses. This hub will go into some detail on how do you get Smartphone viruses, what sort of damages can a Smartphone virus do, and what you can do to protect yourself.Â
Android's Open Problem
Google would have very little recourse since it already charges nothing and enforcing some sort of Google Apps requirement would alienate its core customers (manufactures/carriers) as well as be a PR mess after selling Android as an open platform. This is the predicament Google is in. Any effort to exert control over Android by Google will remain toothless and unenforceable unless they directly contradict their "Open" mantra. The problem has recently been made apparent with reports that Google has beenÂ requiring Andy Rubin's blessing for early access to codeÂ as well asÂ 3.0s half-baked source code being withheldÂ from the community. Just as predicted this has lead to some bad PR and community backlash. That said, the negative response has been tempered by two realities.
Google is a media darling and most Android advocates realize their platform would benefit from greater Google driven standardization, lest Android turn into something likeÂ this.Â 
I suspect these two events are indicative of Google's strategy to exert control over its ever fragmenting OS. Up until now handset makers haven't had incentive to provide the latest Android version because most consumers haven't noticed enhancements introduced by the various 2.x releases, especially when said changes have been buried under the plethora of custom interfaces. Honeycomb, on the other hand, is gearing up to be a major release for handsets with highly visible interface and feature enhancements. A must-have Honeycomb would make early access a necessity for manufacturers to stay competitive and provide Google the leverage needed to stem fragmentation, limit UI customizations, and protect their interests.Â
The only problem with this solution is that handset makers don't see Android as a platform as much as they see it as a feature. As such they are slow to update and tend to obfuscate rather than advertise specific Android versions. They don't care about having the latest and greatest Android so why would they care about having early access to future releases, especially if that access has strings attached. If manufacturers opt for continue free reign, withholding code may actually result in even longer release turnaround and even more fragmentation. Even if Google is able to get manufacturers onboard with Honeycomb, what's to stop them from jumping ship?
Google has to walk a thin line over the next couple of months. Without any control, Android will further fragment, but too much control will alienate partners used to being pampered.
A Growing Threat
As we know there will be potential problems in security prospective on any portable device like Smartphone. Many recently created attacks are targeting the Smartphone's runnig the Android based operating system. There are some android based Smartphone's like BlackBarry, Apple and Windows & models that making them as a big target of threats. And the apps provided system is already vulnerable.
Effects of Virus / Malware / Trojan to Smartphone
The term Malware describe all maliciousness of software's not only the virus, logic bomb or Trojan it describes each and everything malicious. 
There are some acts of malware and they are all actual cases.
Sending SMS to premium services and surely they will charge extra money like to call on 1-900, 976 etc.
The process of sending personal information to unknown party.
The botnet process of a Smartphone gives command to stranger to execute spam or DDOS attacks.
Giving rights to monitor your calls or messages can also be most danger.
When you are connecting your Smartphone to pc you need to install some solid software stuff.
Android Hacked App can Turns Your Phone into a Botnet Zombie
When Smartphone malware will be on the rise Symantec can detect them. Symantec is a world leader and most famous to detect malwares on your Smartphone. It just detect the steamy window through a Chinese website. it will provide help to turn your phone into bootnet zombie condition. If your Smartphone will zombified hackers can easily remotely control to your Smartphone
The Sending process of premium text messages
The blocking process of text messages
Addition of bookmarks
Browser setting to forcedly visit certain website.
There are some prevention steps.
Password or Locker
Password and lock can also be hacked but it takes several times. The setting process of password protection will also provide you some security measures and these measures are most important for security prospective like remote wipe. 
Cell phone is your personal property doesn't lend it to anyone else.
When you will give your phone to someone else he can intentionally or not installs malware into your Smartphone.
Never click on any attachment or link
Do not click on any attachment or link unless you or sure.
Do not install applications from unknown sources before your surety
Backups provide help to restore information. 
Number of attacks on mobile devices from last year is showing on above.
From Oct 2011 Android were designed to store the personal data from a user's of smart phone, or from the phonebook user's, text messages, or even from call log. Denis Maslennikov saying at Kaspersky that the users are the front-runners when they stealing the data. 
Chinese hackers take more interest about the devices information rather than the personal information. Russia is on second number who takes interest in Android cybercriminals. And they are also more interested in cold hard cash.  Android Russian malware writers begun to create new SMS Trojans. Where phone sending the repeated texts to 1-900 phone numbers and from overall the world million of users who notice their phone account has been compromised. New affiliate programs are introducing making it possible which automatically generate variety of SMS Trojans have many selection of tools and options for spreading through smart phone or tablet, e.g. through fake storefront application, or through QR codes, in 2011 discoveries Malslennikov wrote in a long post about Android malware. 
Mobile Malware Evolution, Part V - Kaspersky Lab
What's waiting in 2012 for us? Briefly, the following are given below.
In Android OS interest continue among mobile virus writers, whose primarily efforts focused on creating malicious programs,
Number of attacks arise using vulnerabilities. Obtaining the root access on a smart phone exploits are used, but in 2012 expect the first attacks exploits used to infect the mobile phone OS.
Involving malicious programs increase the number of incidents found in official applications stores, primarily Android Market.
For Android the first mass worm. 
Mobile espionage spreading __Denis Maslennikov, Senior Malware Analyst, Kaspersky Lab
Including the ways to control a smart phone form a remote location, new threats are underway.
In 2011 designing the threads to control a device become very common. Today's, in terms of sheer numbers, backdoor malware codes are designing for Trojan spyware. And Chinese virus writers are busy in nonstop production of backdoors. For, By passing normal authentication by enabling the remote access to device, backdoor is the method in computer system. The backdoor take form (of installed program or to subvert the system) what is called root kit, malicious software hard to detect. For gaining the super-user privileges or for maximum access on the system most of these Android backdoors contain exploits designs.
Maslennikov says that " Many users don't realize still that they are victims of cyber crime."
So far this year, according to Kaspersky Lab, 34% of malicious Android programs were Trojan spyware programs, 31% of backdoor programs accounting and SMS Trojan are 27%.
Smartphone's have recently become increasingly popular because they provide "all-in-one" convenience by integrating traditional mobile phones with handheld computing devices. However, the flexibility of running third-party software's also leaves the Smartphone's open to malicious viruses. In fact, hundreds of Smartphone viruses have emerged in the past two years, which can quickly spread through various means such as SMS/MMS, The good news, experts say, is that phones present problems for hackers and other bad guys that traditional computers don't. Imminent danger of smartphone attacks against telecom infrastructure (privacy issues, identity theft, DoS) outlined some defense strategies. When you are connecting with new peripherals you need to use urge system architecture. Depth analysis requires detecting the stranger user abnormal behavior. It can be detected through several ways like Spam email methods etc to trace and limit Smartphone effectively Very expensive to put defenses into various parts of telecom infrastructure Only a handful of telecom carriers, easy to coordination between them. There are several kinds of attacks are possible. They are now becoming widespread according to a report of a lookout security software firm. As compare to others android users are most likely to encounter malware in June as compare to last month specially and there problems are continually increasing rapidly. Most viruses and other malware are designed for Windows, because that's the most popular operating system. Since Smartphone use a variety of different platforms, someone writing malicious software needs to pick and choose. And while e-mail databases exist that enable phishes, spammers and others to blast their messages to huge chunks of users at once, it's tougher to get lists of telephone numbers, much less numbers specifically for Smartphone users. So we have to do some major precautions for the security process of Smartphone's from warms and viruses.