Apply to be a Chitika Publisher!
Buy t-shirts, mugs & gifts from my shop.

avast

avast
Download your 2012 Free Antivirus Streamlined. Light. Free. Security trusted on 170+ million devices.
Showing posts with label After computers. Show all posts
Showing posts with label After computers. Show all posts

10/01/2011

Pirates of mobile phones also




After computers, computer hackers began targeting mobile phones to steal the data stored in them, which may include data Mtakulh financial transactions.

According to The New York Times that they already managed to penetrate the mobile public figures in the West, such as Prince William, and Scarlett Johansson, which provides companies to protect the information an opportunity to expand its activities by producing programs that provide greater protection from hacker attacks and other programs and harmful viruses threaten the personal data of phone owners phones.
Among the data messages to text or personal, and data on the location of users of those phones.
One example is offered by the newspaper to penetrate systems, mobile phones, the success of pirates this year in the robbery of eighty of applications related to the system "Android" through a malicious program called the "Druid Dream."
The pirates, malicious code into applications stolen, and paid users to download these programs as a pseudo-real programs from the system, Android. The company Google has announced that 260 thousand phones branded exposed to attacks from pirates.
To combat these attacks, companies have begun specializing in information protection programs practical steps to stop the penetration.
New York Times and remember in this connection that the company "Mac Avi" began yesterday in promoting the new service enables users to protect their smartphones, including their computers and tablet PCs.
The same company last week introduced a program to protect the special corporate mobile devices.
During the last month, the company concluded, "AT & T partnership" with the company "Juniper Networks" to protect the production of applications for mobile phones for the benefit of users as individuals and companies.
And entered the U.S. Department of Defense on the line when called on the companies and universities to discuss ways to protect the devices that are running Android from malicious programs.
While international companies such as "Company Lock Out" competing with each other to face the new threat to pump tens of millions of dollars in investments for production and development of protection programs for returning a significant profit, the movement of the New York Times as experts that hackers mobile phones do not pose a major threat after.
However, they acknowledge the other hand, that the threat of pirates is based with the increasing use of mobile in the conduct of financial transactions, including through credit cards.


Source: New York Times

powered by crawl-it