Newest Post
// Posted by :Unknown
// On :Sunday, December 18, 2011
methods to reduce the risk of hacking |
With the advanced use of cell phones in
Additional protection by cell phone service providers and manufacturers need continuous improvement because the wireless technology, and threats against it, is here to stay.Cell-phone viruses downloaded from the Internet spread the same way as a computer virus. Infected files are downloaded using the phone's Internet connection, or downloaded to a computer and then synchronized or transferred to the phone.
In order to protect a cell-phone from this type of exploit the user should verify the authenticity of downloads to make sure they are from trusted sources. In addition, users should consider using mobile antivirus software and synchronize files selectively since frequent synchronizing gives the maximum opportunity for transferring infected files.
Bluetooth wireless connection threats occur when a user receives a virus via Bluetooth while the phone is in discoverable mode, thus the user should turn off Bluetooth and discoverable mode until it is needed.
. Additional protection by cell phone service providers and manufacturers need continuous improvement because the wireless technology, and threats against it, is here to stay.
Cell-phone viruses downloaded from the Internet spread the same way as a computer virus. Infected files are downloaded using the phone's Internet connection, or downloaded to a computer and then synchronized or transferred to the phone. In order to protect a cell-phone from this type of exploit the user should verify the authenticity of downloads to make sure they are from trusted sources. In addition, users should consider using mobile antivirus software and synchronize files selectively since frequent synchronizing gives the maximum opportunity for transferring infected files.
Bluetooth wireless connection threats occur when a user receives a virus via Bluetooth while the phone is in discoverable mode, thus the user should turn off Bluetooth and discoverable mode until it is needed.
Multiple levels of defense create the most effective protection.
The second level of protection resides with phone manufacturers and software developers. The third level of protection is the end user's responsibility.Also, users should lock their keypad when not in use to prevent unauthorized access and change passwords frequently.