Malware and Spyware Malware and Spyware Attacking Cell PhonesAttacking Cell Phones
Chris Gooch, Jessica Russell, Chris Gooch, Jessica Russell, Destiny LoganDestiny Logan
Key WordsKey Words
MalwareMalware- - malicious software that is targeted to malicious software that is targeted to attack cell phones through viruses.attack cell phones through viruses.
SpywareSpyware- - software that reveals private information software that reveals private information about the user or computer system to eavesdroppers.about the user or computer system to eavesdroppers.
Phishing Scam-Phishing Scam- fraudulent Web page, e-mail or fraudulent Web page, e-mail or text message that entices people to reveal passwords, text message that entices people to reveal passwords, financial details or other private data.financial details or other private data.
Key Words ContinuedKey Words Continued
Trojan Horse- Trojan Horse- a program that claims to be useful a program that claims to be useful but actually harbors hidden malicious codebut actually harbors hidden malicious code
Virus- Virus- computer code that inserts itself into another computer code that inserts itself into another program and replicates when the host software runs.program and replicates when the host software runs.
Worm- Worm- self-replicating code that automatically self-replicating code that automatically spreads across a network.spreads across a network.
Malware and SpywareMalware and Spyware
350 million Smartphones by 2009350 million Smartphones by 2009 More than 300 kinds of MalwareMore than 300 kinds of Malware Bigger the system, Bigger the problemBigger the system, Bigger the problem Symbian system runs more than 70 Symbian system runs more than 70
percent of Smartphones.percent of Smartphones.
Viruses and Proctective Viruses and Proctective SoftwareSoftware
RedBrowser, Cabir worm, CommWarriorRedBrowser, Cabir worm, CommWarrior FlexiSpy spywareFlexiSpy spyware ““SMishing”SMishing” F-Secure, McAfee Virus Scan Mobile, F-Secure, McAfee Virus Scan Mobile,
SymnatecSymnatec Vulnerability of Cell PhonesVulnerability of Cell Phones Security Security
ConclusionConclusion