摘要: Despite the promising start, Electronic Commerce has not taken off mostly because of security issues with communication infrastructures that are popping up threateningly undermining perceived trustworthiness in Commerce. Some Internet issues, like malware, phishing, pharming well known to community. Such being, however, transferred telephone networks thanks symbiotic relation between two worlds. an interconnection is becoming so pervasive we can really start thinking about a unique network, which, this paper, refer as Interphonet. The main goal paper analyze some being Interphonet and also identify new Interphonet. In particular will discuss mobile phones malware identity theft, phishing SMS, pharming, untraceability phone calls use VoIP Caller ID spoofing. We briefly countermeasures.

参考文章(14)
Sang ho Kim, Choon Seong Leem, Security threats and their countermeasures of mobile portable computing devices in ubiquitous computing environments international conference on computational science and its applications. ,vol. 3483, pp. 79- 85 ,(2005) , 10.1007/11424925_10
A. Castiglione, G. Cattaneo, A. De Santis, F. Petagna, U. Ferraro Petrillo, SPEECH: Secure Personal End-to-End Communication with Handheld information security solutions europe. pp. 287- 297 ,(2006) , 10.1007/978-3-8348-9195-2_31
Francesco Palmieri, Ugo Fiore, Providing true end-to-end security in converged voice over IP infrastructures Computers & Security. ,vol. 28, pp. 433- 449 ,(2009) , 10.1016/J.COSE.2009.01.004
Alfredo De Santis, Aniello Castiglione, Giuseppe Cattaneo, Maurizio Cembalo, Fabio Petagna, Umberto Ferraro Petrillo, An Extensible Framework for Efficient Secure SMS complex, intelligent and software intensive systems. pp. 843- 850 ,(2010) , 10.1109/CISIS.2010.81
A. F. Salam, H. R. Rao, C. C. Pegels, Consumer-perceived risk in e-commerce transactions Communications of The ACM. ,vol. 46, pp. 325- 331 ,(2003) , 10.1145/953460.953517
G. Karmous-Edwards, Global e-science collaboration computational science and engineering. ,vol. 7, pp. 67- 74 ,(2005) , 10.1109/MCSE.2005.32
John Harauz, Lori M. Kaufman, A New Era of Presidential Security: The President and His BlackBerry ieee symposium on security and privacy. ,vol. 7, pp. 67- 70 ,(2009) , 10.1109/MSP.2009.29
Roger Thompson, Why spyware poses multiple threats to security Communications of The ACM. ,vol. 48, pp. 41- 43 ,(2005) , 10.1145/1076211.1076237
G. Lawton, E-mail authentication is here, but has it arrived yet? IEEE Computer. ,vol. 38, pp. 17- 19 ,(2005) , 10.1109/MC.2005.377
William Enck, Patrick Traynor, Patrick McDaniel, Thomas La Porta, Exploiting open functionality in SMS-capable cellular networks Proceedings of the 12th ACM conference on Computer and communications security - CCS '05. pp. 393- 404 ,(2005) , 10.1145/1102120.1102171