Article Preview
TopIntroduction
Nowadays the development of mobile devices is inevitable, so the chat technology migrates from the PC platform to this new technology (Simmonds, 2017; Weber, 2010; Jin & Chung, 2019). Information is used in all spheres of its existence with significant economic and social impacts (Fernández, 2019). After rapid growth of the Internet and Mobile networks, today we see the development of smaller, faster, high-performance mobile devices that can support a wide range of features that, not long ago, were the attributes of personal computers (Bucerzan & Raţiu, 2015).
In recent years, the development of mobile communications and mobile terminals, notably the launch of the Android smartphone platform, has injected new vitality into the mobile space (Bucerzan, Rațiu & Manolescu, 2013; Purkayastha & Singhla, 2013; Biørn-Hansen, Grønli & Ghinea, 2019). Android’s real history began when Google purchased Android Inc. in 2005 (Google, 2018). However, development did not start immediately. The real progress on the Android platform began in 2007 when Open Handsets Alliance announced the Android platform as the Open Source platform and later produced Android SDK 1.0.
In the same year, G1 was produced by HTC and was sold to the T-Mobile operator. In the next two years, four versions of Android came out. In 2010, there were at least 60 devices running Android, and it became the second best-distributed mobile platform after Blackberry (Mahajan, Verma, Erale, Bondea & Arya, 2014; Frigerio et al.,2018; Oide, Abe & Suganuma, 2018). Smartphones contain the right features and rely on cloud services. In addition to managing mobility, this creates another dimension of cloud threats (Oide, Abe & Suganuma, 2018; Archana, Mythili & Nithya, 2015; Elmezayen & El-Rabbany, 2019; Friedman & Hoffman, 2008). Runtime Android is the authoring engine. It includes the Dalvik virtual machine and android base libraries (Purkayastha & Singhla, 2013). Even worse, developers are developing apps in a hurry in order to meet preset deadlines (Fernández, 2019). Some authors (Fernández, 2019; Friedman & Hoffman, 2008; Pauget &Dammak, 2018) observed that this leaves vulnerability in the algorithm that can be exploited by the attacker.
From the data of the specialists it appears that there is a malware developed for smartphones that has the ability to steal the personal data of the users, causing significant damage in terms of user privacy and security (Jin & Chung, 2019; Elmezayen & El-Rabbany, 2019; Friedman & Hoffman, 2008; Pauget &Dammak, 2018). Installing applications from sources that are unreliable or unreliable is the main cause of data leakage, providing sensitive information to its generator (Ashraf, Hur & Park, 2019). The vulnerabilities created by the user give the opponents certain exploitation opportunities and target attacks (Everett, 2016; Ray, 2018; Sicari, Rizzardi, Grieco & Coen-Porisini, 2015). The required security features that Smartphones have for securing applications are not quite effective, as evidenced by XSS (cross script side) attacks and targeting the Android Platform at 44% (Ray, 2018). It has been observed that in most cases these applications are provided by reputable companies. According to specialist studies, this system can be expanded by sending alerts to parents' devices (Fernández, 2019; Ray, 2018; Pratim Ray, 2016).