TITLE

Mobile Malware & the Looming Security Storm

AUTHOR(S)
Ramsay, Maisie
PUB. DATE
December 2011
SOURCE
Wireless Week;Dec2011, Vol. 18 Issue 5, p22
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the significance for the information technology (IT) administrators to enhance mobile security solutions on smartphones used in the company to provide protection against hacking, mobile malware, and spam. It presents the insights of several experts in the industry including Sean Sullivan, Gareth Maclachan, and John Eagles concerning the threat of hacking on wireless systems. Maclachan mentions the increasing simplicity of sending spam attacks on smartphones.
ACCESSION #
67654911

 

Related Articles

  • Untitled. Ashford, Warwick // Computer Weekly;1/18/2011, Issue 3, p97 

    The article focuses on efforts being made by Microsoft Corp. to protect its customers from computer hackers. It mentions that Microsoft is examining reports of a vulnerability in the Windows graphics rendering engine which could allow hackers taking control of targeted computers. It informs that...

  • FILTER. Macsai, Dan // Fast Company;Jul/Aug2010, Issue 147, p26 

    The article presents information on the Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference to be held in Redmond, Washington on July 13, 2010.

  • Antispam tools multiplying like spam. Fontana, John // Network World;2/17/2003, Vol. 20 Issue 7, p18 

    Reports on the increase in number of antispam technology products. Release of gateway product and upgrades to MailFrontier Inc.'s client software at Demo 2003 conference; Server edition of Sunbelt Software Corp.'s spam filtering software; Announcement of name and product of Q-Spam.

  • BARNEY'S RUBBLE. Barney, Doug // Network World;09/25/2000, Vol. 17 Issue 39, p7 

    Presents computer network-related news items, compiled in the week of September 25, 2000. Alliance of 15 online marketers to control unsolicited electronic mail messages; Electronic commerce shakeout predicted by business consultant Tom Peters.

  • AITP on-line. Oriez, Charlie // Information Executive;Nov/Dec99, Vol. 3 Issue 11/12, p6 

    Presents tips on how to avoid spams or unsolicited e-mail. Includes use of high-level domain; Options for blocking spam at the servers; Places spammers use to harvest e-mail addresses.

  • You Breach, You Pay? Ritchey, Diane // Security: Solutions for Enterprise Security Leaders;Aug2011, Vol. 48 Issue 8, p12 

    The article reports on several legislation introduced in the U.S. to prevent cybercrime and data breaches including Personal Data Privacy and Security Act which requires American businesses that collect and store consumers' sensitive personal information to safeguard information from cyber threats.

  • Fighting spam: Theory and practice. Gibbs, Mark // Network World;2/16/2004, Vol. 21 Issue 7, p90 

    Elaborates on the theory and practice of preventing spam. Technical formatting of the required infrastructure; Importance of considering the legal issues associated with spam prevention; Need of charging for e-mail.

  • Verizon's weird antispam science. Gibbs, Mark // Network World;3/19/2007, Vol. 24 Issue 11, p70 

    The author reflects on the antispam technologies of Verizon Communications Inc. in the U.S. He states that the sender call-back verification (SCV) technique used by the company became a liability to the users, instead of being a tool for filtering unsolicited email messages. He states that SCV...

  • Music star outwits hate-mail spammers.  // Computer Weekly;7/4/2002, p56 

    Reports information technology developments in Great Britain as of July 2002. Launch of online dating service; Availability of the online archive service; Strategy in avoiding unsolicited mails.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics