You are here: hacking technology > hacker invade > Content
Hot Articles
Recommend Articles
New Articles
Hackers and malware developers attention to your phone
  Add date: 10/23/2010   Publishing date: 10/23/2010   Hits: 161
The Symbian Foundation has admitted it needs better Schutzma?measures to prevent b?sartige applications find their way into mobile phones. The Symbian Foundation has added so that a botnet-building Trojan horse?ude - Sexy Space - procedures for digital signatures, the group is a potential loss severity of the audit procedures. Fortify Software Foundation predicts past, this problem is even worse for handset manufacturers and developers of operating systems. "The problem with phones is that Verarbeitungskapazit?t is on an almost exponential increase, corresponding with some of the latest smartphone technology, the PC is seen in the first part of this decade ", Said Richard Kirk, head of application vulnerability specialist. "And w?While the average smartphone has the power over the past jumped mehrereos, la-la-technology behind the scenes and the weight?To avoid arranty safe practices to any security vacuum in the operating system and / or applications is not as up to date, as it is on the desktop and handheld platforms ", A?adio.
For this reason, went to Kirk, hackers, and b?say Sartiges software - blocked by the growing complexity?t in the desktop / laptop security before - his attention to the microcomputer that many of us have in our pockets - Smartphone. The problem with smart phones, explained?rte it that they truly mobile device?te traveling with us from home to office, and is not subject to conditions, the real world, but still connected by a mixture of GSM, 3G and WiFi. Add high-quality mobile e-mail and Internet access, and you have a recipe for potential disaster data loss in production, as the modest hackers Smartphone offers a fast, always-on back door on a computer desk at home and corporate networks in the office. "At the same time, time, one is reinforcing?RURAL error, and that most corporate IT industry wireless security, probably in 1990 "He said. "For this reason, k?You can expect more of the same will happen in the coming weeks and months, as the mobile phone industry continues with its IT security is increasingly teething, A?adio.
Prev:Five steps to protect corporate data by employees steal desperate temptation secrets Next:The criminal attacks Erh?increase social networking sites

Comment:

Category: Home > hacker invade