Anything 2 Share All - Tips Make money online-Phim-video clip-wallpage-software-picture!

Share for all tip, tut, free picture, film, video clip, wallpage, software, etc...

2011 will be the year of mobile malware

(VNA) - Perhaps one of the most common predictions in the six years that mobile malware will suddenly rise, and widely distributed .
Perhaps one of the most common predictions in the past 6 years that mobile malware will suddenly rise up and widely distributed by the growth of smartphones with advanced operating systems.
Users common perception that the threat is aimed at the desktop and laptop without paying attention to their mobile phone.
According to statistics published last month by analyst firm Gartner, III/2010 quarter, to 80 million smartphones were sold worldwide, accounting for about 20% of  total mobile phone sales. Smartphone like cable Internet and therefore vulnerable to attack than other mobile devices.
Fraudulent applications
Market for mobile applications are increasingly popular with different operating systems from Apple's IOS and Google's Android Phone to Windows 7 from Microsoft and Symbian. Apple maintains tight control on the App Store, applications help reduce fraud. But bad applications for other operating systems are gradually appearing.
On May 09/2010, researchers from security vendor Fortinet has uncovered a mobile component for Zeus - a malicious bank "notorious" steal account information. Components aimed at mobile devices Symbian Series 60 or BlackBerry, formerly code-block has been used to confirm the transaction.
The mobile applications have a certificate of legal registration, allowing it to be downloaded and installed on the device. The development is disrupted when many banks are considering the use of mobile phone to send code used by SMS rather than produce a separate device that can generate code.
There are few ways for defense applications sneaky phishing, and users should be careful about downloading programs, particularly for the operating system that applications can not be controlled.
Traditional malware
While the Windows operating system as being plagued by malware, there are very few malicious programs aimed at mobile devices. But researchers have found application as fake dialer that sends messages to the phone number of imposters. Other threats include worms spread through public communication protocol such as Bluetooth.
With the increasing use of computer tables using the mobile operating system, those devices will also be subject to similar threats. Bradley Anstis - vice president of technical strategy of the company's security M86 believe it will happen in the next 12 months.
The data collection issues and security
The mobile application can also be other risks related to privacy, such as gathering, transmitting or storing data. The ad network and the mobile application developers are often interested in the arguments surrounding the issue of how and where their applications are being used.

Data may include information identifying a specific device, users who are not aware that they are being watched. However, Apple does not allow the application developer to collect basic information, which users are notified.
Social engineering
Just like desktop and laptop, phishing is not related to a technical procedure. Phishing - scam using a fake web page to trick users into revealing sensitive information - more threats on mobile devices. People tend to trust their mobile devices than computers and so easy to be fooled by Phishing.
Anstis said the phishing sites are often blocked on the corporate network. But if someone is using a mobile device to work on 3G network, that connection does not have to go through the gate, but the company's network operator can block malicious web pages. Anstis also said M86 was developed on a system basis that the browser can send the URL to its data center to analyze and prevent malware.
Other companies also see opportunities for new services on mobile devices. For example, Juniper Networks has purchased the system in May SMobile 7 / 2010 to 70 million. Amir Khan - the manager of business development for the UK and Ireland said: SMobile has a lab in Columbus, Ohio, used to focus on mobile malware research.
Khan said the reason they set up the system because they recognize the threat in the mobile space is very specific. Threats to the desktop is moving to the mobile world.

 (according to PC World )

0 comments:

Post a Comment

Thank you for reading this article. Do you have suggestions or how to do better, please leave a few words to share with everyone. Please note you, these comments are not calculated suggestions or help build each other progress will be deleted without notice. In addition, you necessarily have a Google account, or networks are listed below (including OpenID) will be a review. The comment is absolutely not carry political content, reactionary, chửi pool, for that reason, you must have one of the accounts in question.Sorry for the inconvenience. Wish love your home more and more visitors. Content type in Vietnamese will be marked with clear easy to account for more than sympathy.

Donation

Search By Your Customize

Custom Search

Subscription

Enter your email address:

Delivered by FeedBurner

Labels

Sponsored Links

Asd by any program
Free Website Hosting affiliate_link adf.ly - shorten links and earn money!