Skip to main content

Home/ ITGS News/ Group items tagged malware

Rss Feed Group items tagged

sarah d

Mobile Malware Targeting Smartphones - 1 views

  • A comparison of these statistics to the worldwide smartphone population places the number of infected devices globally in the millions. Because the vast majority of these infections are designed to be stealthy and the fact few smartphones have Anti-Malware applications, most infected users are unaware their devices have been compromised.
    • sarah d
       
      i dont know if this counts as examples. i think it might be too broad.
Madeline Brownstone

BBC NEWS | Technology | Alarm sounded over wi-fi networks - 1 views

  • Surveys of consumer use of wi-fi routers suggest that a maximum of 40% of the machines use encryption to limit who can use them. In addition, most people do not change the default password the device ships with making it easy for attackers to get access.
  • few routers have lock out mechanisms that stop endless attempts to guess passwords
  • The team recommended that people be forced to change default passwords and encouraged to use encryption - both of which can limit the ability of wireless-borne malware to spread.
  •  
    "Surveys of consumer use of wi-fi routers suggest that a maximum of 40% of the machines use encryption to limit who can use them. In addition, most people do not change the default password the device ships with making it easy for attackers to get access. "
Mariam B

Cisco Security Exec Cheers on Android's Security Flaws - 0 views

  •  
    This article discusses the security flaw that is present in the current mobile device, Android. The Android is easily able to download applications onto the phone, however certain applications may contain Trojan horses and other malicious malware. This impacts businesses and employment because large companies allow their employees to use the Android during work in order to record, send and transmit important information. However with lack of security, certain applications may have the ability to leak sensitive and private company information to others. This impacts the stakeholders: which includes the company whose information is being leaked and the employee that is using the device to store their data and send files to one another. Due to the lack of security that is enabled on the applications and the phone, certain applications make it harmful to store private company data. This becomes an issue of security because the applications are not secure and therefore the phone cannot be used for business purposes because the lack of security causes a threat on privacy as well. Solutions to this are a closed application approval process which is what apple does with its application- each one is viewed in order to see if it is secure. This step should be taken with the applications that are on the Android as well in order to make it more secure.
1 - 4 of 4
Showing 20 items per page