IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

Viruses Prey on Mobile Phones

21 October 2008 By Saran

It should not really be surprising at how mobile phones would be the target of most viruses today. For one, they are the hot commodities we hear of today and similar to PC computing before, they are the hot target viruses want to wreck havoc on.

It is not really constrained to creating a mess. They are a challenge. Their wireless means of surfing the web and using programs that may be hard to penetrate with the basic security features is the penetration issue that any hacker today would want to conquer.

Spammers are bound to have their teeth in as well. These two juvenile delinquents of the cyber world are bound to be aggressively aching to get their name in the mobile internet issues. The opportunity is simply too tempting to pass up.

According to its annual Emerging Cyber Threats report, cybercriminals will start targeting smartphones as they are being used more frequently by users when it comes to financial matters and therefore are a source of sensitive personal data such as credit card and bank account details.

Source

Filed Under: IT Security Basics, Network Security, Real-World Issues, Security Policies, Spyware, Wireless Security Tagged With: cyberworld, mobile phones, viruses

The Potential Threats of Foregoing Cyber Security

23 May 2007 By Saran

While most of the world relies heavily today on computers and the Internet, safeguarding data and intrusion from malicious hackers and technology advanced individuals should be the main cause for concern.

Cyber Security

It is no secret that most systems that do not have the proper security programs face the risk of potential loss of information or being a cause for downtime for servers that need to be operational 24/7. Without the security perimeter fences installed, a server or workstation is prey to a lot of attacks stemming from hackers, worms and Trojans that are spread all over the Internet today.

The risk is indeed high considering that a lot of personal and business related programs and files are the bloodstream of most operational works today. Without the proper cyber guards to act as assigned protectors to key data, internal operations and key components in systems will surely be facing threats that may not immediately be recovered by back-up systems alone.

[tags] internet security, cyber security, cyberspace, cyberworld, firewall, intrusion[/tags]

Filed Under: Backups, IT Security Basics, Malware, Network Security, Operating Systems, Physical Security, Privacy & Anonymity, Programming, Real-World Issues, Security Policies, Spyware, Storage, Tips, Wireless Security Tagged With: cyber-security, cyberspace, cyberworld, firewall, internet-security, intrusion

Categories

  • Backups
  • Cryptography
  • E-mail
  • Firefox
  • General
  • Google Chrome
  • IM
  • Instant Messaging
  • IT Security Basics
  • Malware
  • Network Security
  • News
  • Operating Systems
  • Physical Security
  • Privacy & Anonymity
  • Programming
  • Real-World Issues
  • Review
  • Security Policies
  • Spyware
  • Storage
  • Tips
  • Web browsers
  • Wireless Security