How Smartphones Work

The Future of Smartphones

With data transmission rates reaching blistering speeds and the incorporation of WiFi technology, the sky is the limit on what smartphones can do. Possibly the most exciting thing about smartphone technology is that the field is still wide open. It's an idea that probably hasn't found its perfect, real-world implementation yet. Every crop of phones brings new designs and new interface ideas. No one developer or manufacturer has come up with the perfect shape, size or input method yet. The next "killer app" smartphone could look like a flip phone, a tablet PC, a candy bar or something no one has conceived of yet.

Perhaps the most challenging consideration for the future is security. Smartphones may be vulnerable to security breaches such as an Evil Twin attack. In one of these attacks, a hacker sets a server’s service identifier to that of a legitimate hotspot or network while simultaneously blocking traffic to the real server. When a user connects with the hacker’s server, information can be intercepted and security is compromised.


On the other side, some critics argue that anti-virus software manufacturers greatly exaggerate the risks, harms and scope of phone viruses in order to help sell their software. Read more in the article How Cell Phone Viruses Work.

The incredible diversity in smartphone hardware, software and network protocols inhibit practical, broad security measures. Most security considerations either focus on particular operating systems or have more to do with user behavior than network security.

For lots more information on smartphones and related topics, check out the links on the following page.

Related HowStuffWorks Articles


  • "Active objects."
  • Ames, Ben. “Chip Makers Support Mobile TV for Smartphones” IDG News Service. Feb. 12, 2007. ( Jan. 8, 2014) _1.html?source=searchresult
  • ARCchart Whitepaper. “Mobile Operating Systems: The New Generation” September 2006. ( Jan. 8, 2014)
  • comScore. "comScore reports February 2014 U.S. Smartphone Subscriber Market Share." Press release. April 4, 2014. (April 17, 2014)
  • Ecommerce Times. “The March of the Smartphones.”
  • "EDGE Platform." GSM World.
  • "Expo Highlights Healthy Symbian Economy." PDAStreet. Oct. 6, 2004. ( Jan. 8, 2014)
  • "If the mountain will not come to Mahomet, Mahomet must go to the mountain: SyncML plug-in for Microsoft Exchange released."
  • Koetsier, John. “800 million Android smartphones, 300 million iPhones in active use by December 2013, study says.”Feb. 6, 2013. (Jan. 8, 2014)
  • Lavender, Schmidt. "Active Object - An Object Behavioral Pattern for Concurrent Programming."
  • “Mobile phones to get more touchy, report finds.” Feb. 22, 2007. ( Jan. 8, 2014)
  • “Linux, Windows forecast to pass Symbian by 2010.” Feb. 9, 2006 (Jan. 9, 2013)
  • OMA Technical Section - SyncML Whitepaper. (Jan. 8, 2014)
  • OMA Technical Section - Affiliates - SyncML Compliant Products. (Jan. 9, 2014)
  • Palm Infocenter. (Jan. 8, 2014)
  • Prince, Brian. “Next Wave in Security: Protecting Smart Phones, PDAs.” eWeek. Feb. 9, 2007. (Jan. 9, 2014)
  • Rash, Wayne. “Big Changes Ahead for Smart Phone Market.” Nov. 30, 2006. ( Jan. 8, 2014),1895,2065929,00.asp
  • Rouse, Margaret. “Mobile Telephony Fast Reference Guide.” December 2010. (Jan. 8, 2014),289893,sid9_gci1192492,00.html
  • Series 60 Application Development. (Jan. 8, 2014)
  • Series 60 Platform. (Jan. 8, 2014)
  • Smartphone Thoughts. (Jan. 8, 2014),8313
  • Symbian: Technology. (Jan. 8, 2014)
  • Whitepapers. (Jan. 8, 2014)
  • White, Dave. “Mobile Control of Your Front Door”. Mobile Magazine. Feb. 21, 2007. ( Jan. 8, 2014)