Sunday, May 24, 2020

Biblical and Religious Themes in Sonnys Blues Essay

James Baldwin’s short story, â€Å"Sonny’s Blues,† is the authors most studied and critically analyzed piece of literature. The majority of these analyses focus on the obvious themes of the book such as jazz music, the unnamed narrator, or the rift that divides Sonny and his brother. Little critique has ever gone into the biblical and religious themes that run throughout the story of â€Å"Sonny’s Blues.† Furthermore, it is even more astonishing that there is little critique given Baldwin has such a strong history with the world of Christianity. James Tackach wrote that it should not come as a surprise that Baldwin would use stories or references from the Bible as a foundation for his literature (109). Baldwin was practically raised in the†¦show more content†¦The cup of trembling comes from the Book of Isaiah. â€Å"Awake, awake, stand up, O Jerusalem, which hast drunk at the hand of the Lord the cup of his fury; thou hast drunken the dre gs of the cup of trembling, and wrung them out,† the passage of scripture reads (Isaiah 51:17). This passage from the Bible is God telling His people that He knows they have suffered and are terrified of His fury. God promises they that will no longer drink from the cup of trembling and instead will put it into the hands of their enemies. This passage implies hope that those, like Sonny and his brother, who have been affected with fear and misery, will no longer be plagued. There are four great fears when drinking from the â€Å"cup of trembling.† Those fears are devastation, destruction, famine, and death. Sonny and his brother have both experienced each of these in some form. Keith Byerman states that if the cup of trembling is given, then Sonny will continue to suffer and feel guilt; if they cup is taken away, then Sonny returns to a state of grace (371). Byerman also states that the drink itself, scotch and milk, is a symbol of destruction and nourishment to the bo dy, the scotch being the destruction and the milk being the nourishment. Sonny’s acceptance of the drink indicates that his life will continue on the edge between the poison of his addiction and the nourishment ofShow MoreRelatedThe Biblical Foundation Of James Baldwin s Sonny s Blues1301 Words   |  6 Pagesâ€Å"Sonny’s Blues† is one of James Baldwin’s most famous short stories, and probably his most noteworthy one. Countless people have analyzed the several obvious themes and concepts that are within â€Å"Sonny’s Blues,† like jazz music and the unnamed narrator. However, surprisingly, I have not found many articles regarding the several religious and biblical references in my search, despite this themes playing a major role in the short story. There are a few mentions of those references in some articles,Read More The Theme of Identity in Sonnys Blues Essay1622 Words   |  7 Pagesshort story Sonnys Blues highlights the struggle beca use community involvement and individual identity. Baldwins leading theme - the discovery of identity - is nowhere presented more successfully than in the short story Sonnys Blues (Reilly 56). Individuals breeds isolation and even persecution by the collective, dominant community. This conflict is illustrated in three ways. First, the story presents the alienation of Sonny from his brother, the unnamed narrator. Second, Sonnys legal problemsRead MoreEssay on Literary Analysis of James Baldwin’s Sonny’s Blues2323 Words   |  10 Pagesview, while others introduce more complex plots and storylines. When it comes to author James Baldwin’s short story Sonny’s Blues, there is much depth given to the storyline and the characters. Sonny’s Blues has been analyzed by many different people throughout time because the story has many elements. From Baldwin’s skillful use of metaphors and similes to his incorporation of religious references, this story is insightfully and complexly written. A simple story about a man and his brother leaves readersRead MoreAnalysis Of James Baldwin s The Blues And Jazz Essay2185 Words   |  9 Pagescame from his spirit of evangelism with lyrical stylings of both the blues and jazz. Baldwin’s writings appropriate all three of these elements of African-American culture in both small, singular elements and entire story structures. All three styles — as well as Baldwin’s own writing, chronicle the Black response to an oppressive society that seeks to silent them. From the perspective of the narrator, the short story is a blues narrative as he becomes more keenly aware of his brother’s troubles inRead MoreA Research on African-American Literature1898 Words   |  8 Pagesto that desire and the resulting struggles in different periods have been faithfully chronicled by Art, Music and Literature. Though there are numerous works recounting racial relations in America, the t hree assigned readings, To My Old Master, Sonnys Blues and Birmingham Sunday, give exceptional reflections of the 1860s 1950s and 1960s America by notable African Americans. To My Old Master by Jourdon Anderson To My Old Master (Young, 1996, pp. 15-16) is chronologically the first of the threeRead MoreAnalysis Of James Baldwin s The Blues 2182 Words   |  9 Pages Sonny’s Blues, a short story by famed African-American author James Baldwin, is the story of two bothers. Other famous stories of two brothers include both The Prodigal Son parable and the story of Cain and Abel, both from which Baldwin clearly draws inspiration from. Baldwin grew up with many religious teachings, as his adoptive father, David Baldwin, was a preacher. Though the relationship between father and son was not enviable, Baldwin still grew up active in his religion (James Baldwin- Biography)Read MoreSymbolism And Biblical Allusions In The Kite Runner937 Words   |  4 PagesKhaled Hosseini uses various symbols and biblical allusions in his novel, ‘The Kite Runner’ to show how each of the characters were connected to each other in more ways than one. Throughout the story the author introduces var ious symbols that embody biblical teachings, vampirism and the path to redemption. From the start of the novel, Hassan was made out to be the near perfect person who was â€Å"...incapable of hurting anyone† (10, Hosseini). Hassan’s only fault being his Hazara lineage. This mixedRead MoreHow to Read Lit Like a Prof Notes3608 Words   |  15 PagesA quester b. A place to go c. A stated reason to go there d. Challenges and trials e. The real reason to go—always self-knowledge 2. Nice to Eat With You: Acts of Communion a. Whenever people eat or drink together, it’s communion b. Not usually religious c. An act of sharing and peace d. A failed meal carries negative connotations 3. Nice to Eat You: Acts of Vampires a. Literal Vampirism: Nasty old man, attractive but evil, violates a young woman, leaves his mark, takes her innocence b. Sexual implications—a

Wednesday, May 13, 2020

Taking The Law Into Our Hands and Two Paths to Womens...

During the Reconstruction era, supporters of women’s rights employed a legislative and organizational means in their battle for equal rights and suffrage. The successes and failures experienced by the 14th and 15th amendments helped shape the landscape of the American suffrage movement that culminated in the 19th amendment. The assigned readings addresses the legislative and organizational avenues that were actively utilized by advocates of women’s rights and suffrage, albeit in slightly different ways. The two readings align well with each other, each bringing an unique perspective of a significant historical phrase within the women’s rights movement in the United States. The first reading, â€Å"Taking the Law Into Our Hands: Bradwell,†¦show more content†¦Drawing upon the original Constitution, the Minors applied an elaborate interpretation to demonstrate the existence of women’s rights to vote as citizen. The main premises of the New Departure established federal sovereignity over state control, the power of federal government in defending individual and collective rights, the benefits enjoyed by all natural born citizens belonged to all, despite one’s sex, and the infringement of one of the most basic privileges of citizenship-voting. Essentially, Minors shifted the main responsibility of suffrage from the state level to the federal level, which brought women suffragists in droves undertaking militant action such as physically registering and voting at ballots. The Minors paved the way for legal agitation for women and on behalf of women. The cases were not always successful in the legal realm, evidenced by the Blackwell and Minor cases. The arguments involving what constitutes of a citizen and the considerations involving the privileges and rights of a citizen laid the formative groundwork for future activism that would eventually lead to the establishment of the 19th amendment. The second reading by Janet Zollinger Giele, Two Paths to Women’s Equality: Temperance, Suffrage and the Origins of Modern Feminism traces two significant forces behind the origins of modern feminism: the temperance movement and the suffrage movement. The first chapter considers the origins and rationale behind women’sShow MoreRelatedThe Wage Gap Is A Conflict Within The Work Force982 Words   |  4 Pagesbeen a few laws that were put into effect due to women’s efforts to create fairness in the workplace. The first law, called the Equal Pay Act of 1963 signed into law by President John F. Kennedy, requires men and women in the same workplace be given equal pay for equal work (U.S. Equal Employment Opportunity Commission). The Paycheck Fairness Act is a recent extension of the Equal Pay Act, it gives workers added protection to take action in the wage discrimination (National Women’s Law Center). WhenRead MoreThe Problem of Gender Discrimination1097 Words   |  4 Pagespurposes, we are told education is our right but still the literacy rate of women in developing countries remains shamefully low. Just as they reach adolescence they are given the role of home makers, not caring whether they are ready or not, so the years that should be spending on secondary education are spent understanding responsibilities of a wife. When they get near to the age that they should have been graduating from high school, and going towards a possible career path that they may have dreamedRead MoreThe Role of Women and Community in Christianity Versus Islam Essay1158 Words   |  5 PagesChristianity and Islam are two of the world’s largest and most recognized religions. They are both religions believing in one God and each has a holy book, the Qur’an and the Bible. Both books encourage belief in God and teach patience and honesty. They both also forbid lying and stealing and believe in some type of Heaven and Hell. So, if they have so much in common, why is there so much conflict between the two? This question is the exact reason why I chose to take World Religion. I thoughtRead MoreSnow By Orhan Pamuk : Final Paper1371 Words   |  6 PagesKars and the relationship between state authority, disobedience, and individual freedom. In Snow, Ka, the protagonist identifies the suicide girls and the ones who are against taking off their hijabs as â€Å"Islamic Feminists, which means, Islamic feminists ground their arguments in Islam and its teachings, seek the full equality of women and men in the personal and public sphere, and can include non-Muslims in the discourse and debate. In Snow, the headscarves controversy overshadowed turkey and theRead MoreThe Lesser Of Two Evils1375 Words   |  6 PagesThe Lesser of Two Evils While America is the land of opportunity, for the past few years the opportunities have been limited. A major decision that Americans are facing currently is who should be president. Before our first black president can leave his 8 year long reign, we must first elect our next head of state. Our two most endorsed candidates have extremely conflicting stances and back grounds. While some people might think that Donald Trump is the better candidate because of his successfulRead MoreDemocrats vs. Republicans Essay1247 Words   |  5 Pagesvs Republicans In the United States there are only two main political parties to choose from. The two main parties are the Democrats and the Republicans. There are also many other political parties to choose from which are called third parties. Third parties may include political parties such as the Socialist Equality Party and the Peace and Equality party. People can choose to be a part of any party they want but most go with the common two main parties the Democrats and Republicans. DemocratsRead MoreThe Path For Gender Equality2156 Words   |  9 PagesHeather Locker English 101 Prof. Riedel 18 May 2016 The Path to Gender Equality in Afghanistan The rise in poverty, illiteracy and the conservative nature of the post-Taliban Afghanistan has left those uneducated to follow the teachings, or customary laws, of radicalized Mullahs, who teach their own adaptations of the Quran which often assert men’s dominance over women, in various ways including but not limited to: physical abuse, psychological abuse, abuse within the community (i.e. shunning, hearsayRead MoreDoes Cedaw Make World Better Place For Women? Essay7028 Words   |  29 PagesDoes CEDAW make world better place for Women? Submitted by Ashalika Pandey Research Scholar (Law) University of Allahabad ashalikapandey@gmail.com Contact no.: 09415662408 Table of Contents Abstract †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Chapter 1: Introduction ....................................................... Chapter 2: ConventionRead MoreWomen And Women s Rights2455 Words   |  10 Pagesaddressing right now or issues that have barely been brought up. There are two paths that feminism can take, the road to success and equality or the road to devastation and loss. There are many positive and negative ideologies that may happen in the future and are brought to the surface, but the main questions are, what is exactly the problem? What needs to change? And why will our society not except the idea of equality of women and men? The significance of changes in the future means that the feministRead MoreWomen in the Workplace: Work Life Balance and Equal Opportunity to Enhance Women Empowerment2973 Words   |  12 PagesUniversity, Batch 19 I. EXECUTIVE SUMMARY More and more women now perceive employment and career paths are critically important to them and that parenting as an option is currently unattractive since they feel that parenting is incompatible with their career. Working women have the sense if they want to be succeeded; doing dual role both office and family is totally out of the question. On the other hand, if they prefer to multitask between office and family, almost certainly they will end up having

Wednesday, May 6, 2020

Book cover judgments Free Essays

The term ‘book cover judgments’ bears only negative connotations. It’s widely accepted in the society that a person should analyze and synthesize all the available information before arriving at any decision. People who sometimes make book cover judgments are considered shallow and hypocritical. We will write a custom essay sample on Book cover judgments or any similar topic only for you Order Now It’s often deemed to be a sign of narrowness and over-indulged self-opinion. Psychologists struggled to prove that the first impression is frequently the most lasting and important one, yet the society still keeps to the notion that superficial judgments are the greatest evil. Upon careful investigation, it becomes evident that book cover judgments often provide the most relevant and accurate information, being an important way to organize information, which is especially relevant at the dawn of the Information Age. In many cases, book cover judgment can provide the most relevant and accurate information. It’s especially true about making up one’s mind about other people: it’s a well-known fact that the first impression can be formed from brief exposure to another, and it can last for years. It can be proven by one of the new fads, speed-dating, organized by such companies as 8MinuteDating and HurryDate, when people meet with a dozen of people for up to ten minutes and then decide on their potential companions. Its concept rests on a simple belief that a couple of minutes can be plenty of time to understand a person up and judge compatibility. It’s not a top secret that everybody evaluates each other based on immediate intuitions. Scientists are discovering that in many situations our social intuition is indeed astonishing, as we can sometimes collect a considerable amount of information about a person’s nature or abilities in just a few seconds. Initial encounters are emotionally intense events that can overwhelm us, therefore true and accurate judgments can be formed. Book cover judgments are not simple hardwired reactions, since people are also taught how to judge others, holding our first impressions up to the light of social stereotypes. Implicit attitudes that enter into our calculations are always in place. As a consequence, sometimes book cover judgments are considered synonymous to such words as stereotypes and prejudices. Prejudices and stereotypes are schemes that assist us in comprehending the reality; when reality does not correspond to our prejudice it is easier for our mind to modify our interpretation of reality than to modify the prejudice. Prejudices help us to complement information when we do not posses at the moment. And here it’s of paramount importance to draw a line between these two concepts. From a psychological perspective, stereotypes are simply ways to organize information in your head. Having stereotypes amount to having life experience to build upon. It’s necessary to use stereotypes to draw parallel with other similar cases in the past, to avoid mistakes or use the strong sides of some employees. Stereotypes consist basically in shared beliefs or notions about a certain group or event. A stereotype is a combination of characteristics that sums up this group or event. The goal of stereotypes is to simplify reality. Prejudices, however, are judgements we make about another person or group of people without trying to understand them. They are divided into negative or positive in character, yet negative prejudices prevail. Prejudices often go along with ignorance, fear or hatred. When making judgments about groups of people, book cover judgments aren’t enough. It has been shown already that one can’t do without organizing information without help of stereotypes. This is especially true in the Information Age when people are receiving a huge amount of information every second. Information flows are continuously intensifying, and this tendency is projected to amplify in the future. In the past, people had enough time to allocate to such matters as judging and rethinking. The decline of conventional philosophy at the beginning of the 21st century is the evidence of the diminishing value of in-depth analysis. While this analysis is sometimes performed for a variety of reasons, it’s conspicuously absent from our everyday life. It’s too early to blame modern men for laziness or ignorance – without making book cover judgments, it’s impossible to make sense of all the information we have to process every day. In other words, book cover judgments are necessary for many reasons. First of all, they can quickly provide much information about a certain person just after few minutes of initial contact. Secondly, stereotypes have been proven to be an important way to organize information. Las but not least, book cover judgments are the only option available to the society living in the Information Age. The society should gradually change its negative perception of quick judgments. Psychologists have already started debunking many myths about the psychological mechanism behind making book cover judgments. Instead of trying to diminish the value of this essential psychological tool, people should be trained to handle first impressions effectively and derive maximum information possible from the first seconds of encounter. How to cite Book cover judgments, Papers

Monday, May 4, 2020

Mobile Phones And The Mobile Phone Virus Essay Example For Students

Mobile Phones And The Mobile Phone Virus Essay Mobile phone viruses began to emerge, the first mobile phone virus was called Caribe, it was created to infect the Symbian mobile OS. By using the Bluetooth communication feature it was able to spread from phone to phone and upon activation of the device it would display the message Caribe. In 2009 the first iPhone worm Ikee was created it was able to infect and spread among jailbroken iPhones that had installed SSH while using the default root password. This worm changes the wallpaper of your lock screen to a photo of Rick Astley with the message: ikee is never going to give you up.† As of 2011, it s reported that as much as 73,000 malware strains are written every day. Considering that mobile smart phones have slowly been replacing our PC’s daily to do task, we are more at risk now that these malwares are being increasingly written for mobile phones. Just look at history and what occurred with PCs: It may have started as a practical joke, but soon after users started p utting more increasingly personal information it slowly turned from a joke into a more malicious purpose. History always repeats itself and it will be no different with smartphones and with this growing issue we need to be ready to increase our mobile security. Mobile malware that exists for mobile devices varies depending on the platform it’s trying to infect. For example, An Android Trojan is Backdoor.AndroidOS.Obad.a. It is a multi-functional Trojan that enables remote control of the device and allows the programmer access to install programs on to the phone to further infect your device. The Trojan spawned from vulnerability in the DEX2JAR software. DEX2JAR is a program that is used to convert an APK file into a JAR format, which is an executable java file format. Also a hole in the Android operating system was introduced. The virus modifies the xml file (AndroidManifest.xml) to bypass Google standards and allows exploitation on the device. There isn’t a user interface to acess the Backdoor.AndroidOS.Obad.a Trojan, and the program continues to spread in the background processes of the device. Ikee, was the first worm that was known for iOS devices. The worm replaces the wallpaper with a photograph of the singer Rick Astley. It was done through ssh protocols that were made available by jailbreaking an iOS device. Jailbreaking is the process of hacking into the iOS operating system and deleting the restrictions applied by Apple. Apple’s iOS operating system without jailbreaks has still seen many trojans and worms that spread through the App Store, for example the attack on the App Store is by a Russian application that took the user’s contact book information and uploaded the contacts to a server. This app has been removed through from the App Store after being closely monitored with Kaspersky anti-virus. Several instances have occurred in which users with jailbroken iPhones have had private data stolen from their phone. The name of the worm that is commonly linked to stealing private data on iPhones is iPhone/Privacy.A. The tool scans the Wi-Fi network and searches for jailbroken iPhones. After finding the phone the tool copies all data from SMS messages, videos, emails and so on. The program is run on the background while the user continues to use their phone. Statistics from the last few year show the mobile device world has become a major targets for cybercriminals. According to IDC (International Data Corporation), during the first quarter of 2012, Android recorded a year over year rise to an approximate 145% in market share and sales, becoming the most attacked operating system due to the sheer size of its market share and open source architecture. In 2013, nothing was significantly changed in terms of the mobile operating systems that are targeted by malware, Android is still the number one target and other OS get anywhere closer. In the first half of 2013, McAfee Labs researchers counted an approximation of 36,699 mobile malware samples, where 97% of those samples were designed to attack Goog le Android; by the end of this year the mobile malware samples reached 148,778 according to the Kaspersky Security Bulletin for 2013. The reasons for this are Android’s leading market position, based on the incidence of third party app stores and its open source architecture, which make it easy to use for everyone: app developers and malware authors as well. Therefore this trend is not expected to experience any change in further years. On the next graphs it is possible to see this trend and how it has changed over the past three years. Fig A. Mobile Malware trend by OS (2011) Fig B. Mobile Malware trend by OS (2012) .u655ebb4030fb8b5e8ec086d9331bcffb , .u655ebb4030fb8b5e8ec086d9331bcffb .postImageUrl , .u655ebb4030fb8b5e8ec086d9331bcffb .centered-text-area { min-height: 80px; position: relative; } .u655ebb4030fb8b5e8ec086d9331bcffb , .u655ebb4030fb8b5e8ec086d9331bcffb:hover , .u655ebb4030fb8b5e8ec086d9331bcffb:visited , .u655ebb4030fb8b5e8ec086d9331bcffb:active { border:0!important; } .u655ebb4030fb8b5e8ec086d9331bcffb .clearfix:after { content: ""; display: table; clear: both; } .u655ebb4030fb8b5e8ec086d9331bcffb { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u655ebb4030fb8b5e8ec086d9331bcffb:active , .u655ebb4030fb8b5e8ec086d9331bcffb:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u655ebb4030fb8b5e8ec086d9331bcffb .centered-text-area { width: 100%; position: relative ; } .u655ebb4030fb8b5e8ec086d9331bcffb .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u655ebb4030fb8b5e8ec086d9331bcffb .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u655ebb4030fb8b5e8ec086d9331bcffb .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u655ebb4030fb8b5e8ec086d9331bcffb:hover .ctaButton { background-color: #34495E!important; } .u655ebb4030fb8b5e8ec086d9331bcffb .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u655ebb4030fb8b5e8ec086d9331bcffb .u655ebb4030fb8b5e8ec086d9331bcffb-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u655ebb4030fb8b5e8ec086d9331bcffb:after { content: ""; display: block; clear: both; } READ: Taming Of The Shrew (197 words) EssayMobile Malware trend by OS (2013) The most critical factor that comes along with the mobile malware development has been the growing use of mobile devices as a form of secondary authentication for user credentials or online transactions. The most common manifestation of this is the mobile transaction authentication number (mtan), which is the authentication used by some banks during online banking transactions. Malware developers are currently able to avoid this extra level of protection by creating a mobile application that catches the SMS messages used to validate these transactions, one example of it is the popular mobile banking Tro jan. On the next graph it is shown the malware distribution by behavior type. Fig C. Malware distribution by behavior type Fig D. Malware distribution by behavior type Finally, according to Juniper Networks the Mobile malware is becoming â€Å"an increasingly profitdriven business†. Mobile vulnerabilities are no longer just a playground for cybercriminals, but have become a common practice to accomplish the new main purpose, which is the financial profit. The following graph shows the comparison between discovered threats that are profit-motivated versus non-profit-motivated ones. Fig E. Mobile Threats profit-motivated versus nonprofit-motivated V. Future Examples of malware and research a. Android: One Root To Own Them All This is a vulnerability showcasing the technical details of Android security bug 8219321, disclosed to Google in February 2013. The vulnerability involves discrepancies in how Android applications are cryptographically verified installed. It allows for APK code modification without breaking the cryptographic signature. Therefore, that in turn is a simple step away from system access control. The vulnerability affects a wide number of Android devices, across generations architectures, with little to no modifications of the exploit. b. Android SpyPhone Service The Android SpyPhone service can be injected into any Android application. Phones can be tracked and operated from a Web based command and control server. The application can be used to track the phone s location, intercept phone calls and SMS messages, extract e-mail and contact lists, and activate the camera and microphone without being detected. c. Compromised CDMA Femtocell A Femtocell is a low-power cellular base station given or sold to subscribers by mobile network operators. It works just like a small cell tower, using a home Internet connection to interface with the provider network. When in range, a mobile phone will connect to a femtocell as if it were a standard cell tower and send all its traffic through it without any indication to the user. The state-of-the-art authentication protecting cell phone networks can be an imposing target. However, with the rising popularity of femtocells there is more than one way to attack a cellular network. Inside, they run Linux, and they can be hacked. A femtocell can be used for traffic interception of voice/SMS/data, active network attacks, and can even be able to clone a mobile device without physical access.. d. iOS Device Malicious Chargers Despite the plethora of defense mechanisms in iOS, it is possible to inject arbitrary software into current-generation Apple devices running the latest operating system (OS) software. All users are affected, because it requires neither a jailbroken device nor user interaction. An iOS device can be compromised within one minute of being plugged into a malicious charger. USB capabilities can be leveraged to bypass these defense mechanisms. To ensure persistence of the resulting infection, an attacker can hide their software in the same way Apple hi des its own built-in applications. To demonstrate practical application of these vulnerabilities, a proof of concept malicious charger was built, called Mactans, using a BeagleBoard. This hardware illustrates the ease with which innocent-looking, malicious USB chargers can be constructed. While Mactans was built with limited amount of time and a small budget, it is mind bottling what more motivated, well-funded adversaries could accomplish. VI. Conclusion With the threat of â€Å"Mobile Malware† looming in the air, the desire to give the general public fair warning has never been greater. This paper was intended to provided that knowledge the general public needs and will reinforce the topic to those who were already aware. The history of malware gave you a look into the not so distant past. The discussion of technical examples of malware was intended to show you how rapidly the threat is developing along with the statistics of malware’s current expansion, and the future examples of malware and research showed you concepts that were unimaginable to the common electronic consumer. The majority of malware was originally designed to be a practical joke , but as we can see from the ever growing desire for malicious intent, the evolution of malware has followed suite. We can only hope that the growing need for security can be met.