Keeping Mobile Malware at Bay

Alleven, Monica
August 2006
Wireless Week;8/15/2006, Vol. 12 Issue 17, p22
Trade Publication
The article highlights the efforts of several vendors in the antivirus industry to prevent malicious code writers from being successful in their attacks in the wireless industry. It has been predicted that virus creators will increasingly make their moves as open operating systems become more mainstream. Vendors in the anti-malware community are in various stages of development to prevent future attacks to the sector.


Related Articles

  • Is it legal...:...to write "proof of concept" viruses?  // Australian Personal Computer;Nov2004, Vol. 24 Issue 11, p15 

    The article focuses on Cabir mobile phone virus which is one of many proof of concept viruses created by researchers. Publishing the code of a proof of concept virus is not illegal, as under Australian law the publisher must intend to commit a computer crime. However, if the security hole has...

  • WIRELESS SCRAMBLES TO BATTEN DOWN THE HATCHES. Mehta, Stephanie N. // Fortune;10/18/2004, Vol. 150 Issue 8, p275 

    The article discusses how the proliferation of corporate Wi-Fi systems, illicit and approved, has created a new wave of security challenges for Internet technology departments. The very thing that makes Wi-Fi so attractive to companies--its ability to transmit large streams of data to every...

  • Dial 0 for virus scan. Maher, William // Australian Personal Computer;Oct2004, Vol. 24 Issue 10, p14 

    This article discusses the virus problem in PCs. As if the problem of viruses on PCs wasn't bad enough, mobile phone users are now also facing the prospect of downloading and updating antivirus software. In the wake of the widely-reported Cabir virus, said to be the first type to target mobile...

  • Don't Be Out'smart'ed. Panettieri, Joseph C. // T H E Journal;Feb2006, Vol. 33 Issue 7, p18 

    The article discusses the threats posed by smart mobile phones to data security. More than 100 viruses now target smart phones running mobile operating systems from several high technology companies including Microsoft Corp. Consider the Cabir worm, which targets mobile phones running Symbian OS...

  • Analysis of Virus Algorithms. Kalyani, Jyoti; Kahlon, Karanjit Singh; Singh, Harpal; Kalyani, Anu // Journal of Computer Science;2006, Vol. 2 Issue 10, p785 

    Security of wired and wireless networks is the most challengeable in today's computer world. The aim of this study was to give brief introduction about viruses and worms, their creators and characteristics of algorithms used by viruses. Here wired and wireless network viruses are elaborated....

  • Trojan hits Windows PDAs for first time. Bedbarz, Ann // Network World;8/9/2004, Vol. 21 Issue 32, p1 

    After finding the third malicious program targeting wireless devices in fewer than 60 days, security specialists are warning that it is only a matter of time before attackers will launch a serious attack against mobile telephones and personal digital assistants (PDA). Malicious programs...

  • Estimating the Number of Faults in Code. Gaffney Jr., John E. // IEEE Transactions on Software Engineering;Jul84, Vol. 10 Issue 4, p459 

    This paper provides formulas relating the number of faults or "bugs" to the number of lines of code and to the number of conditional jumps. A result is that there are, on the average, about 21 bugs per KSLOC discoverable after successful compilation. A major motivation for the work presented...

  • An Unsecured Mobile Device Could Spy On Us, Steal Money from Us. Kadam, Avinash W. // PC Quest;Aug2013, p38 

    The article focuses on the adverse impact of an unsecured mobile device on businesses. It reveals that unsecured mobile device can be used as a rogue device that can spy individuals as well as steal money and information from firms. It highlights several levels when securing mobile devices...

  • No one safe from 'net crooks. Ross, Ian // Northern Ontario Business;Dec2005, Vol. 26 Issue 2, p10 

    The article focuses on the interest of Internet professional criminals in targeting small businesses. Internet criminals steal valuable and sensitive financial information. There are two computer viruses per day that prop up and several million reports of automated attacks worldwide. Some...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics