Mobile devices security

Written by Mike Ber


Continued from page 1

Almost atrepparttar same time withrepparttar 143262 appearance ofrepparttar 143263 first Trojan for PDAs,repparttar 143264 first virus to affect cell phones has also arrived. This worm is called “Cabir”, and it has been spotted by some security specialists who issued an alert concerningrepparttar 143265 danger. Cabir spreads using a file named “Caribe.sis” and travels across devices working withrepparttar 143266 Symbian operating system which is used in PDAs and many cell phones. Cabir places itself usually on a mobile device when a user agrees to a transmission showingrepparttar 143267 text message "Caribe". After thatrepparttar 143268 worm begins a nonstop search particularly for Bluetooth-connected wireless devices to send itself to. Also,repparttar 143269 battery’s life ofrepparttar 143270 infected device is harshly reduced during this process. The inventors of Cabir did not designrepparttar 143271 worm to spread massively. It was intended to be a test demonstrating that these mobile devices can be easily infected by viruses because of their rapid maturation. The worm rated with a low risk because it has to be intentionally activated by a mobile phone user, and also allowingrepparttar 143272 Caribe package requires pressing a button priorrepparttar 143273 files can be loaded intorepparttar 143274 receiving phone.

It was predictable that viruses and worms for cell phones and PDAs would appear. This isrepparttar 143275 end result ofrepparttar 143276 impressive advances made in mobile communication technology inrepparttar 143277 past years. Over time, cell phones and PDAs turn out to be more PC-like, making them vulnerable to viruses. And because they are more PC-like, smart cell phones and PDAs are mostly used by companies for mission-critical applications and data storage. Also they are used for receiving emails and text messages just like desktop computers. That makes their users just as exposed to viruses and worms. These security concerns can be dealt with software-encryption solutions that need to be attached torepparttar 143278 new devices. The encryption technology expands to mobile devicesrepparttar 143279 identical type of security that many companies have organized into their desktop computers. It encrypts data and prevents illegal access torepparttar 143280 data stored withinrepparttar 143281 device, which is either lost or stolen.

Mike Ber is the owner of the Canadian Domain Name Portal called www.Every.ca He is also a contributing author to www.ComputerMagazine.ca, www.Developer.ca, and www.XP.ca


Antivirus Software

Written by Mike Ber


Continued from page 1

Nowadays, most viruses are spread inrepparttar form of e-mail attachments. This is because some ofrepparttar 143261 worst recent viruses relay on recipients that throw away common sense and launch a deadly e-mail attachment. Commonlyrepparttar 143262 attachments are with extensions that include .bat, .com, .exe, .pif, .scr, and .vbs. Sometimes to avoidrepparttar 143263 filters of antivirus software, virus creators enclose their malicious code in a .zip or .rar archive file. The file might even have a password to full antivirus programs that scan inside archives. And obviously,repparttar 143264 password is included inrepparttar 143265 message as an image forrepparttar 143266 convenience ofrepparttar 143267 naive user. As a simple but reliable rule, you should never open an attachment that you didn’t expect to receive, even if it came from someone you know. Also, make sure your e-mail software is configured so it will not automatically open attachments.

Another common way of spreading viruses is file sharing. Many viruses spread themselves throughout open network shares. You can protect your computer not sharing files or directories overrepparttar 143268 network. But if you don’t have a choice and you have to share your files, you are still able to reducerepparttar 143269 risk of being infected by installing antivirus software and keeping it updated. Other ways to become infected with viruses are downloading files or software fromrepparttar 143270 Internet, instant messaging or even web pages.

Ifrepparttar 143271 file you are downloading orrepparttar 143272 computer you are downloading it from is infected with a virus, there is a big chance that your computer will also become infected withrepparttar 143273 virus. As forrepparttar 143274 instant messaging,repparttar 143275 major risk comes from accepting files from other users onrepparttar 143276 network. This risk can be minimized by configuring your antivirus software to scan all incoming files and also configure your other programs not to automatically accept files, and not to automatically executerepparttar 143277 files you accept. Certain viruses are known to infect web servers. If you visit a website from an infected server, your computer could be infected withrepparttar 143278 same virus, but this is a very rare method of infection.

There are many different threats that are targetingrepparttar 143279 computers. Although they are very different, all of them are popularly called viruses. A virus by definition is a self-replicating file, not considering whether it is malicious or not. Another type ofrepparttar 143280 so called viruses are worms; they circulate mainly through e-mail but also spread through a network. A worm is aware he is located in a network and uses it for replicating itself. Trojan horses (or trojans) are mostly used to insert some remote tools into a system in order to giverepparttar 143281 attacker free access to that system, withoutrepparttar 143282 user’s knowledge. Most Trojan horses cannot replicate automatically.

Withrepparttar 143283 increased number of Internet users,repparttar 143284 existing threats are also raising as now there are many more computers to attack and more people that don’t know to stay away from these threats. Butrepparttar 143285 antivirus software producers are making it easier for us. There is a lot of antivirus software which cover a lot of threats. All we have to do is install one.

Mike Ber is the owner of the Canadian Domain Name Portal called www.Every.ca He is also a contributing author to www.ComputerMagazine.ca, www.Developer.ca, and www.XP.ca


    <Back to Page 1
 
ImproveHomeLife.com © 2005
Terms of Use