Smartphone and Safety

Smart Phone Security

Smart Phones are the hot cakes in todays generation. Newer technologies evolve everyday and has now brought the whole world in our pocket. As a result of the evolution of smart phone, security for smart phones today are an important issue everyday. Many protocols have been designed to enable secure communication and one such set of protocol is Near Field Communication or NFC.

What is NFC ?

Near Field Communication or NFC is a set of protocols or standards needed to communicate between two devices by either touching or bringing the device in close proximity (less than 4 cms).
The communication standards of such devices is based on the RFID standard that also does include ISO 14443.These standards are defined and extended by NFC forum in 2002,by some major companies like Nokia,Samsung and Sony etc.
The operating frequency of such devices is merely 13.56 Mhz(+/-7) which is very low,which helps to integrate into portable devices without much need of battery power.


This layer is mainly focussed on the exchange between two NFC devices or NFC Tags.

NFC uses,NDEF or NFC Data Exchange Format,a format which was defined by the NFC forum,is used to transmit data.This is a simple BINARY MESSAGE format.There are many type of text message binary format which includes text,url etc.


The above fig. shows you the various libraries used by the Android Stack.

NFC stack can be divided into three parts-

1- Kernel.

2- NFC services.

3- NFC tags or device itself.


NFC Aware Malware –

Android is one of the rapidly growing mobile operating systems and the so called “Marketplace”,is full of Malwares which will run at the background of some legitimate looking application while it sends your important details to someone else with your acknowledgement of course !

The NFC Malware-affects your android,this kind of Malware can proxy through the request through themselves before the correct application can get activate. One such example is proxy-ing any URL which are stored in an NFC tags, when parsed, fires up the malware instead of the Browser.

None of the smart-phones are safe enough ! Infact the Android phones,the so called secured ones are the most to be affected by the Malwares than any other smart phone operating system due to the wide range of use-they are like the Windows of Mobile Phones.
Be sure of what applications you use & be safe !

Latest Comments
  1. Jett

    I see you share interesting stuff here, you can earn some extra money, your
    blog has huge potential, for the monetizing method, just search in google
    – K2 advices how to monetize a website

  2. Leslie

    I read a lot of interesting articles here. Probably you spend
    a lot of time writing, i know how to save you a lot of time,
    there is an online tool that creates high quality, google
    friendly posts in minutes, just search in google – k2seotips unlimited content

  3. Hogan Online Uomo

    sconti woolrich Prezzi Orologi Gucci arctic jacket woolrich felpa woolrich Ugg Da Bambina Champagne, ostriche di Marennes-Oléron o d’Arcachon a un pranzo di nozze? No grazie. Raffinatezza, cultura della cucina e del vino sono già tesori d’Italia. Lo provano le tavole blasonate di oggi che celebrano, fra argenterie, cristalli e porcellane, i sapori locali, l’osservanza o la rivisitazione di ricette antiche. C’è tanto da scoprire e da utilizzare. Prodotti e i

  4. the big short torrent

    In the interim, Shaw needs to retaliate for the demise of his
    sibling, Owen Shaw, who was slaughtered by Dominic and his gathering in “Quick & Furious 6. It can also be that if you are a businessman that is building several great deals with Indian colleagues. Since they are providing you with free content, in return they ask for very little like visiting and using the services of their new website, filling up a feedback form etc.

  5. telefonos movistar fijos

    Discullpen ppor el hecho de que aal querer descargqr los datos de algun juego me da error en el wifvi yaa probe varfios apk y en todos da fallo.
    Planeta Pocoyo” & © dos mil nueve – dos mil quince Ziinkia Entertainment, La próxima aplicación que creemos que es imprescindible
    este dos mil quince es Solid Explorer.

Leave a Reply

Your email address will not be published. Required fields are marked *