According to AhnLab, 2011's major mobile security threats include: the explosive increase in the number of the malicious code
that make direct billing; malware disguised as famous applications; increasing numbers of privacy-violation applications; malicious codes
target personal commercial information.
e-passport computer chip limit the risks of malicious code
being resident on the chip, a necessary precondition for a malicious code
attack to occur from the chip against computer systems that read them.
The abuse of trusted domain names attack vector was spotted during October by Finjan's Malicious Code
Research Center (MCRC) when searching for popular services with a slight change of the top level domain.
The United States hosts more than one third of the websites containing malicious code
identified during 2006, as well as relaying more spam than any other nation, according to new research from specialist IT security firm Sophos.
The increasing severity of computer viruses and malicious code
has transformed information security from a low IT priority to an operational necessity," says Charles Perkins, co-team leader, Information Services at Barton.
Mazu Networks, the leading provider of behavior-based, network security solutions, today announced that Mazu Profiler(TM) enabled their customers to quickly detect and contain the Zotob worm, while significantly reduce future exposure by malicious code
Internet filtering company, Websense, has warned users to be aware of fake blogs or web journals that are used to infect users' computers with malicious code
such as keylogging software or viruses.
The most important reason is that we believe it is wrong to hire someone who has actively created or released malicious code
into the wild.
Using sophisticated algorithms, Websense identifies malicious code
and enters those sites in the PG III database.
Finjan have published the latest findings from its Malicious Code
Research Center (MCRC).
Under terms of a three-year agreement, DISA will utilize real-time threat and vulnerability intelligence reports generated by Symantec to issue security recommendations and protect extensive IT assets throughout the Department of Defense (DOD) from malicious code
ASEC Report finds that Trojans remain most reported malicious code
in third quarter