TITLE

Keeping Mobile Malware at Bay

AUTHOR(S)
Alleven, Monica
PUB. DATE
August 2006
SOURCE
Wireless Week;8/15/2006, Vol. 12 Issue 17, p22
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article highlights the efforts of several vendors in the antivirus industry to prevent malicious code writers from being successful in their attacks in the wireless industry. It has been predicted that virus creators will increasingly make their moves as open operating systems become more mainstream. Vendors in the anti-malware community are in various stages of development to prevent future attacks to the sector.
ACCESSION #
22168660

 

Related Articles

  • Is it legal...:...to write "proof of concept" viruses?  // Australian Personal Computer;Nov2004, Vol. 24 Issue 11, p15 

    The article focuses on Cabir mobile phone virus which is one of many proof of concept viruses created by researchers. Publishing the code of a proof of concept virus is not illegal, as under Australian law the publisher must intend to commit a computer crime. However, if the security hole has...

  • Sobigf--another virus nuisance. Sardoni, Ken // Enterprise/Salt Lake City;9/01/2003, Vol. 33 Issue 10, p13 

    Examines the proliferation of computer viruses. Problems caused by a virus attack; Signs of an attack; Recommendations in avoiding or mitigating the effects of viruses.

  • Arming Yourself in the Virus War. Goldsborough, Reid // Black Issues in Higher Education;10/23/2003, Vol. 20 Issue 18, p44 

    Discusses the prevalence of computer virus attacks. Threats posed by the viruses; Precautions against the attacks; Action taken by the U.S. government to address the problem; Ways to obtain virus protection.

  • CHAPTER THREE: Spreading Digital Disease: Viruses, Worms, and Trojan Horses.  // Computer Investigation;2005, p44 

    This chapter describes computer viruses, worms and Trojan Horses. Worms, along with viruses and Trojan horses, are all malicious programs created by people who intend to cause damage to or wreak havoc on other people's computers. A computer virus attaches itself to a program or file so that it...

  • They're all at it. Graham, Christopher // Prospect;Aug2011, Issue 185, p28 

    The article presents the author's views on the efficacy of data protection in Great Britain. He comments on data breaches involving local councils, doctors' surgeries and phone companies. He remarks that the reality of data crime has not been totally understood by legislators and courts. He...

  • An Usage-Centric Botnet Taxonomy. Czosseck, Christian; Podins, Karlis // Proceedings of the European Conference on Information Warfare & ;2011, p65 

    Botnets have been a recognized threat to computer security for several years. On the timeline of malware development, they can be seen as the latest evolutionary step. Criminals have taken advantage of this new technol-ogy and cyber crime has grown to become a serious and sophisticated problem...

  • Cyberworms.  // Junior Scholastic;9/29/2003, Vol. 106 Issue 3, p4 

    Reveals that infection of millions of Microsoft-based personal computers worldwide, causing more than $ one billion in damage, by two computer viruses, Blaster and So Big.F, made August, 2003 the wormiest month on record.

  • Are you safe from infection?  // Cabinet Maker;7/15/2005, Issue 5447, p29 

    Presents steps in the prevention and detection of computer viruses. Advantage of installing an anti-virus software; Importance of filtering malicious emails to prevent virus threats; Need for the creation of backup data to avoid information loss. INSET: Great pretenders.

  • Viruses and hackers and worms ... oh my! Brandl, Dennis // Control Engineering;Nov2003, Vol. 50 Issue 11, p58 

    Offers solutions for addressing computer viruses and worms in the Internet technology environment. Detection in the interior and protection at each system; Limitations of virus protection software; Prime targets for infection; Emphasis on control system network design.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics