<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2022-7-2-0-3</article-id><article-id pub-id-type="publisher-id">2798</article-id><article-categories><subj-group subj-group-type="heading"><subject>INFORMATION SYSTEM AND TECHNOLOGIES</subject></subj-group></article-categories><title-group><article-title>&lt;strong&gt;ANALYSIS OF THE MAIN MOBILE THREATS&amp;nbsp;AND WAYS TO PROTECT AGAINST VIRUSES&lt;/strong&gt;</article-title><trans-title-group xml:lang="en"><trans-title>&lt;strong&gt;ANALYSIS OF THE MAIN MOBILE THREATS&amp;nbsp;AND WAYS TO PROTECT AGAINST VIRUSES&lt;/strong&gt;</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Kuzminykh</surname><given-names>Yegor Sergeevich</given-names></name><name xml:lang="en"><surname>Kuzminykh</surname><given-names>Yegor Sergeevich</given-names></name></name-alternatives><email>egor2014ru@mail.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name><name xml:lang="en"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name></name-alternatives><email>info@sevsu.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2022</year></pub-date><volume>7</volume><issue>2</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2022/2/НР_ИТ_72-3.pdf" /><abstract xml:lang="ru"><p>In the age of the heyday of information technology and the development of the functionality of mobile phones, people are starting to use the phone more, because it is very convenient, besides phones have recently become more and more powerful. But do not forget about intruders who are starting to hunt more and more for user data on phones, because it is much easier to get access to a mobile phone than to a well-protected and complexly equipped computer, because few people use special methods to protect their phone from potential threats. If we take into account the new vulnerabilities that appear after each update, which leads to the emergence of &amp;quot;zero-day&amp;quot; threats, then it becomes impossible for an ordinary user to deal with such threats. This article will discuss the main mobile threats, how to deal with them, what to do if the threat has come and your mobile device is in danger, as well as the analysis of the development and relevance of mobile virus software.</p></abstract><trans-abstract xml:lang="en"><p>In the age of the heyday of information technology and the development of the functionality of mobile phones, people are starting to use the phone more, because it is very convenient, besides phones have recently become more and more powerful. But do not forget about intruders who are starting to hunt more and more for user data on phones, because it is much easier to get access to a mobile phone than to a well-protected and complexly equipped computer, because few people use special methods to protect their phone from potential threats. If we take into account the new vulnerabilities that appear after each update, which leads to the emergence of &amp;quot;zero-day&amp;quot; threats, then it becomes impossible for an ordinary user to deal with such threats. This article will discuss the main mobile threats, how to deal with them, what to do if the threat has come and your mobile device is in danger, as well as the analysis of the development and relevance of mobile virus software.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>mobile threats</kwd><kwd>viruses</kwd><kwd>virus software (VPO)</kwd><kwd>virus protection</kwd><kwd>security</kwd><kwd>mobile phone protection</kwd><kwd>antiviruses</kwd></kwd-group><kwd-group xml:lang="en"><kwd>mobile threats</kwd><kwd>viruses</kwd><kwd>virus software (VPO)</kwd><kwd>virus protection</kwd><kwd>security</kwd><kwd>mobile phone protection</kwd><kwd>antiviruses</kwd></kwd-group></article-meta></front><back /></article>