Newest Post

// Posted by :Unknown // On :Sunday, December 18, 2011


methods to reduce the risk of hacking

With the advanced use of cell phones in Japan, security capabilities are advanced as well.Cell phone use varies around the world. In Japan, cell phones are used for financial transactions similar to a credit/debit card.Cell-phone threats are primarily spread in three ways, Internet downloads, Bluetooth wireless connections, and multimedia messaging service (MMS).

Additional protection by cell phone service providers and manufacturers need continuous improvement because the wireless technology, and threats against it, is here to stay.Cell-phone viruses downloaded from the Internet spread the same way as a computer virus. Infected files are downloaded using the phone's Internet connection, or downloaded to a computer and then synchronized or transferred to the phone.
In order to protect a cell-phone from this type of exploit the user should verify the authenticity of downloads to make sure they are from trusted sources. In addition, users should consider using mobile antivirus software and synchronize files selectively since frequent synchronizing gives the maximum opportunity for transferring infected files.
Bluetooth wireless connection threats occur when a user receives a virus via Bluetooth while the phone is in discoverable mode, thus the user should turn off Bluetooth and discoverable mode until it is needed.
. Additional protection by cell phone service providers and manufacturers need continuous improvement because the wireless technology, and threats against it, is here to stay.
Cell-phone viruses downloaded from the Internet spread the same way as a computer virus. Infected files are downloaded using the phone's Internet connection, or downloaded to a computer and then synchronized or transferred to the phone. In order to protect a cell-phone from this type of exploit the user should verify the authenticity of downloads to make sure they are from trusted sources. In addition, users should consider using mobile antivirus software and synchronize files selectively since frequent synchronizing gives the maximum opportunity for transferring infected files.
Bluetooth wireless connection threats occur when a user receives a virus via Bluetooth while the phone is in discoverable mode, thus the user should turn off Bluetooth and discoverable mode until it is needed.
Multiple levels of defense create the most effective protection.
 The second level of protection resides with phone manufacturers and software developers. The third level of protection is the end user's responsibility.
 Also, users should lock their keypad when not in use to prevent unauthorized access and change passwords frequently.

Leave a Reply

give your comment on my blog for repairs.

Subscribe to Posts | Subscribe to Comments

// Copyright © Information The Technology //Anime-Note//Powered by Blogger // Designed by Johanes Djogan //