With data transmission rates reaching blistering speeds and the incorporation of WiFi technology, the sky is the limit on what smartphones can do. Possibly the most exciting thing about smartphone technology is that the field is still wide open. It's an idea that probably hasn't found its perfect, real-world implementation yet. Every crop of phones brings new designs and new interface ideas. No one developer or manufacturer has come up with the perfect shape, size or input method yet. The next "killer app" smartphone could look like a flip phone, a tablet PC, a candy bar or something no one has conceived of yet.
Perhaps the most challenging consideration for the future is security. Smartphones may be vulnerable to security breaches such as an Evil Twin attack. In one of these attacks, a hacker sets a server’s service identifier to that of a legitimate hotspot or network while simultaneously blocking traffic to the real server. When a user connects with the hacker’s server, information can be intercepted and security is compromised.
On the other side, some critics argue that anti-virus software manufacturers greatly exaggerate the risks, harms and scope of phone viruses in order to help sell their software. Read more in the article How Cell Phone Viruses Work.
The incredible diversity in smartphone hardware, software and network protocols inhibit practical, broad security measures. Most security considerations either focus on particular operating systems or have more to do with user behavior than network security.
For lots more information on smartphones and related topics, check out the links on the following page.