Minute Attack

As the mobile phones and tablets often are turned on round the clock they are at risk for so called Minute Attacks. These are attacks that takes very short time to perform. For example, a person gain access, install malicious software, send data, uninstall the malware (and thereby removing all traces) and log off within a minute. If this occurs at a time when the owner is asleep or elsewhere, the risk of detection is minimal.