New sex for mobile phone
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting.In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
While there's been a scarcity of mobile phone viruses since the threats started to be hyped a handful of years ago, mobile phone virus writers keep working at it, and their numbers are on the rise.
Fortunately, and unlike nasty buffer-overflow style worms that don't require any user input, this worm requires users to interact in order to spread. As hard as it may be to do so, just reject beauty, love, and sex by replying "no." The time to be concerned with mobile malware will come, but it's not today.
A little common sense goes a long way at avoiding social engineering tactics.
The Beselo worm, as F-Secure has dubbed it, is actually an SIS application installation file in the guise of media files named beauty.jpg, sex.mp3, and
And just like the early Commwarrior worm that targets Symbian phones, Beselo attempts to spread through MMS and Bluetooth.
Search for New sex for mobile phone:
Online advertisements for potential DMST victims commonly contain a mobile phone contact number.