Академический Документы
Профессиональный Документы
Культура Документы
CONTENTS
INTRODUCTION HISTORY BASICS HOW THEY SPREAD TYPES OF CELL-PHONE VIRUSES THE DAMAGE DONE PROTECTING YOUR PHONE CONCLUSION
INTRODUCTION
Theyre not just for the computer or internet any more.
Virus, Worms, hackers and spam, Could they be invading your cell phone?
Even the data entered into cell phones can be stolen or infested. Cell phone had automatically started dialing numbers in address book and Helps someone to see every number you call and listen to your conversations -- and steals financial information .
HISTORY
First cell phone worm Celeste Biever emerges on 15 June 2004, at 18:26. The first known cell-phone virus called cabir appeared in 2004 and didn't get very far. Cabir has no malicious capabilities and affects only a small slice of "smart" phones that run on both the sophisticated Symbian operating system and have a Bluetooth connection.
BASICS
A cell-phone virus is basically same thing as a computer. A cell-phone virus or worm spreads via Internet downloads, MMS (multimedia messaging service) attachments and Bluetooth transfers. Current phone-to-phone viruses almost exclusively infect phones running the Symbian operating system.
SMART PHONE
Unlike many traditional cell phones, smart phones allow individual users to install, configure and run applications of their choosing smart phones can : Send and receive mobile phone calls PIM (including notes, calendar and to-do list) Communication with laptop or computers E-mail Instant messaging Play audio and video files
SMART PHONE
BLUETOOTH
Bluetooth is a wireless technology, it is a twoyears old technology,which is a short range of radio technology. That allows wireless data transmission between various computing and communication devices up to a distance of 10 meters or 30 feet and offers data transfer rates up to 1MBPS. Available Bluetooth networks are:
PICONET
SCATTERNET
MMS
Skulls. A
Commwarrior. A
Locknut. B
Fontal. A
CELL-PHONE VIRUSES
Precautions
Some of the precautions that decrease the chance of installing a virus are: Turn off Blue tooth discoverable mode
Check security updates to learn about filenames you should keep an eye out for
F-Secure McAfee Symantec
CONCLUSION
In day to day modern world all the peoples are likely to entertain the music and media channels through via cell phones,so these kind of voracious tasty peoples are having the nature of creating or damaging the system via different interested things available in the market,so we must carefull about the unwanted things occurring in your desktop or screen of your phone. To prevent virus and security attacks, chip vendors, subscriber identity module (SIM) card manufacturers and mobile-handset companies are already engineering new security features for future editions of cell phones.
REFERENCES
"Cell-Phone Viruses." TechnologyReview.com. Cell phone virus turns up the heat." News.com. "First cell phone worm emerges." NewScientist.com. The Future of Cell Phone Viruses." BonafideReviews.com. "New mobile virus ups the ante." SearchSecurity.com.
UERY TIME?
THAN Q