Perhaps the most challenging consideration for the future is security. Smartphones and PDAs are already popular among many corporate executives, who often use their phones to transmit confidential information. Smartphones may be vulnerable to security breaches such as an Evil Twin attack. In an evil twin attack, a hacker sets a servers service identifier to that of a legitimate hotspot or network while simultaneously blocking traffic to the real server. When a user connects with the hackers server, information can be intercepted and security is compromised.
One downside to the openness and configurability of smartphones is that it also makes them susceptible to viruses. Hackers have written viruses that attack SymbianOS phones. The viruses can do things like turning off anti-virus software, locking the phone completely or deleting all applications stored on the phone.
On the other side, some critics argue that anti-virus software manufacturers greatly exaggerate the risks, harms and scope of phone viruses in order to help sell their software.
The incredible diversity in smartphone hardware, software and network protocols restrain practical, broad security measures. Most security considerations either focus on particular operating systems or have more to do with user behavior than network security.
With data transmission rates reaching fast speeds and the incorporation of WiFi technology, the sky is the limit on what smartphones can do. Possibly the most exciting thing about smartphone technology is that the field is still wide open. Its an idea that probably hasnt found its perfect, real-world implementation yet. Every crop of phones brings new designs and new interface ideas. No one developer or manufacturer has come up with the perfect shape or size yet. The next generation smartphone could look like a flip phone, a tablet PC, a candy bar or something no one has conceived of yet.
【英语六级考试快读阅读练习及答案(6)】相关文章:
最新
2016-10-18
2016-10-11
2016-10-11
2016-10-08
2016-09-30
2016-09-30