TITLE

Keeping Mobile Malware at Bay

AUTHOR(S)
Alleven, Monica
PUB. DATE
August 2006
SOURCE
Wireless Week;8/15/2006, Vol. 12 Issue 17, p22
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article highlights the efforts of several vendors in the antivirus industry to prevent malicious code writers from being successful in their attacks in the wireless industry. It has been predicted that virus creators will increasingly make their moves as open operating systems become more mainstream. Vendors in the anti-malware community are in various stages of development to prevent future attacks to the sector.
ACCESSION #
22168660

 

Related Articles

  • Is it legal...:...to write "proof of concept" viruses?  // Australian Personal Computer;Nov2004, Vol. 24 Issue 11, p15 

    The article focuses on Cabir mobile phone virus which is one of many proof of concept viruses created by researchers. Publishing the code of a proof of concept virus is not illegal, as under Australian law the publisher must intend to commit a computer crime. However, if the security hole has...

  • Cyberworms.  // Junior Scholastic;9/29/2003, Vol. 106 Issue 3, p4 

    Reveals that infection of millions of Microsoft-based personal computers worldwide, causing more than $ one billion in damage, by two computer viruses, Blaster and So Big.F, made August, 2003 the wormiest month on record.

  • Sobigf--another virus nuisance. Sardoni, Ken // Enterprise/Salt Lake City;9/01/2003, Vol. 33 Issue 10, p13 

    Examines the proliferation of computer viruses. Problems caused by a virus attack; Signs of an attack; Recommendations in avoiding or mitigating the effects of viruses.

  • Are you safe from infection?  // Cabinet Maker;7/15/2005, Issue 5447, p29 

    Presents steps in the prevention and detection of computer viruses. Advantage of installing an anti-virus software; Importance of filtering malicious emails to prevent virus threats; Need for the creation of backup data to avoid information loss. INSET: Great pretenders.

  • Viruses and hackers and worms ... oh my! Brandl, Dennis // Control Engineering;Nov2003, Vol. 50 Issue 11, p58 

    Offers solutions for addressing computer viruses and worms in the Internet technology environment. Detection in the interior and protection at each system; Limitations of virus protection software; Prime targets for infection; Emphasis on control system network design.

  • Arming Yourself in the Virus War. Goldsborough, Reid // Black Issues in Higher Education;10/23/2003, Vol. 20 Issue 18, p44 

    Discusses the prevalence of computer virus attacks. Threats posed by the viruses; Precautions against the attacks; Action taken by the U.S. government to address the problem; Ways to obtain virus protection.

  • No one safe from 'net crooks. Ross, Ian // Northern Ontario Business;Dec2005, Vol. 26 Issue 2, p10 

    The article focuses on the interest of Internet professional criminals in targeting small businesses. Internet criminals steal valuable and sensitive financial information. There are two computer viruses per day that prop up and several million reports of automated attacks worldwide. Some...

  • Antiviral Shields. Branwyn, Gareth; Clabaugh, Gavin // Futurist;Jan/Feb89, Vol. 23 Issue 1, p38 

    Focuses on the development of computer programs designed to detect computer viruses. Details of the program called C-4, which is known as an antiviral shield; Details of the testing procedure to determine the product's effectiveness; Cost and features of the software.

  • Today's Attackers Can Find the Needle. Mimoso, Michael S.; Savage, Marcia // Information Security;Jun2006, Vol. 9 Issue 6, p24 

    This article discusses the type of for-profit crime plaguing the Internet. Today's hackers want customer data and intellectual property and they also want to infiltrate government agencies. Stealth technology that are being used by attackers include rootkits which are bundled in spyware. Ways to...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics