(240)-343-2585

Today almost all people carry mobile phones as well as computers that are significantly faster than desktop computers that were used in the past. These devices not only enable people to get in touch with each other but also allow them to telework from their respective homes. Since mobile phones as well as tablets are used as a key to an individual’s identity, hackers can use them as a channel to getting to other devices. In other words, the hacks could lead to attacks on an individual’s devices as well as devices of any other person connected on the same network as the first hacked device. The most common hacking method involves forwarding the network traffic directed by the control server to other different hosts in the network if the mobile device is linked to an internal Wi-Fi (Logan, 2011). Essentially, if a person falls victim to this type of attack, he or she exposes attackers to their entire digital life and that of any person connected to his or her network. According to Certic (2013), Worms as well as Man-in-the-Middle attacks are also examples of threats that enable hackers to use one mobile device to access other devices.