Virus & Spyware
Mobile devices are being considered a threat to enterprise security due to the ir increased usage in business. How can we turn around this situation and use phones to increase security instead? Can a phone’s advanced features like camera, GPS etc be used to determine the legitimacy of user login? Is there some data available on this topic? |
- 591 views
- 1 answers
- 0 votes
How could Social Media be the next frontier for threat for IT security professionals and the companies they protect? How big is the threat posed by issues like unauthorized social media accounts, account hijacking and content threat etc? Does it make sense to pay to protect my company’s image in the social media ? |
un:yes'>
- 423 views
- 1 answers
- 0 votes
Neverquest is a banking malware that facilitates the stealing of financial data. The malware follows the CaaS business model. What are the implications of this? How does Neverquest malware spread to new victims? What is the effect of a Neverquest infection on a target and how does it affect his banking transactions? |
- 669 views
- 1 answers
- 0 votes
Samsung and Google have announced the usage of app containerization to separate the phone into two halves-personal and corporate. This method might be fundamental in improving security for mobile devices finding increased usage in business. However will users find it easy to flip between two modes of operation? What could be at risk here? |
- 512 views
- 1 answers
- 0 votes
With respect to improving security for mobile devices, original equipment owners are now moving the security measures to their operating systems. Apple is one OEM which has adopted this approach. Is this a sound rationale to improve safety of usage for these devices? What could be the possible drawback of such a move? |
- 643 views
- 1 answers
- 0 votes
How has the increased usage of mobile devices (like the I-Phone) become a security concern to those in charge of network security? Is it possible to secure such devices so that they don’t become the weak links in the security chain? What are the measures that one could adopt towards this purpose? |
- 604 views
- 1 answers
- 0 votes
What is the Inception Virus? Is there a connection between the virus and the 2010 movie? How does it target its victims? How is the software delivered to its victims? According to reports the virus has been reportedly targeting government agencies. Does this mean that ordinary citizens are not at risk from this one? |
- 539 views
- 1 answers
- 0 votes
Hi,
I hired someone recently to get rid of a virus. They said that I had gotten a virus called "conduit". I looked up what it was and its nasty. But I am still having the same issues that i was having when i hired the person. They were quite pricey so, before i drag him out here again and pay again I want to see if I can figure it out for myself. Can you give me a couple of easy ways to check and see if it is off?
Thanks!
- 888 views
- 1 answers
- 0 votes
Hi,
I have been going to my mail (Gmail in this case) and someone is spamming me. I have unsubscribe to this particular place many many times. I have put it in spam and just ignoring it but it keeps somehow getting around my spam. I have unsubscribe, deleted it, and about everything I can think of. Is there a way I can permanently get rid of it? If I have to install a AntiSpam program that is ok but i would rather (if possible) just get rid of it without downloading anything.
Thanks!
- 548 views
- 1 answers
- 0 votes
Hi,
I have a Droid Phone. It has been a bit weird lately. I keep getting adds when I get online I get adds on Facebook as well as other places. I don't think I should and I definitely thinks something is wrong. Is there some type of antivirus for mobile devices? Do they even need them? Also (if there is) shouldn't mobile devices (such as phones) already come with one? Computers do. Also, how would I get it the adds off? Thanks!
Thanks!
- 591 views
- 1 answers
- 0 votes