Artwork

Contenido proporcionado por wnguyen. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente wnguyen o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.
Player FM : aplicación de podcast
¡Desconecta con la aplicación Player FM !

The Rise of Mobile Malware

18:43
 
Compartir
 

Fetch error

Hmmm there seems to be a problem fetching this series right now. Last successful fetch was on January 20, 2025 03:20 (16d ago)

What now? This series will be checked again in the next hour. If you believe it should be working, please verify the publisher's feed link below is valid and includes actual episode links. You can contact support to request the feed be immediately fetched.

Manage episode 456149636 series 3606199
Contenido proporcionado por wnguyen. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente wnguyen o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.
The Rise of Mobile Malware

Date & Time: 2024-12-14 20:43:57
Conversation with: [Speaker 2] [Speaker 1]

1. What is the impact of the rise of mobile malware?
  • Description: 71% of people use smartphones for work, making them targets for organized crime and sophisticated attacks.
  • Conclusion: Mobile malware poses a significant threat to personal and professional data.
  • Reasons: [Speaker 1] : Smartphones contain sensitive information like passwords, photos, and banking info, making them attractive targets.
2. How does the 'cherry blows' malware work?
  • Description: This malware can steal crypto wallet info from screenshots using optical character recognition (OCR).
  • Conclusion: The 'cherry blows' malware is a sophisticated threat that can compromise crypto wallets.
  • Reasons: [Speaker 2] : It uses OCR to scan screenshots for crypto wallet seed phrases.
3. What are the different types of mobile malware?
  • Description: Discussion on viruses, worms, and trojans, including the Anata Trojan.
  • Conclusion: Understanding different types of malware is crucial for protection.
  • Reasons: [Speaker 2] : Viruses, worms, and trojans have distinct behaviors and impacts.
4. What solutions exist to combat mobile malware?
  • Description: Discussion on awareness, app safety, phishing attacks, and technology like MDM and antivirus software.
  • Conclusion: A layered approach involving awareness, smart habits, and technology is essential.
  continue reading

149 episodios

Artwork
iconCompartir
 

Fetch error

Hmmm there seems to be a problem fetching this series right now. Last successful fetch was on January 20, 2025 03:20 (16d ago)

What now? This series will be checked again in the next hour. If you believe it should be working, please verify the publisher's feed link below is valid and includes actual episode links. You can contact support to request the feed be immediately fetched.

Manage episode 456149636 series 3606199
Contenido proporcionado por wnguyen. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente wnguyen o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.
The Rise of Mobile Malware

Date & Time: 2024-12-14 20:43:57
Conversation with: [Speaker 2] [Speaker 1]

1. What is the impact of the rise of mobile malware?
  • Description: 71% of people use smartphones for work, making them targets for organized crime and sophisticated attacks.
  • Conclusion: Mobile malware poses a significant threat to personal and professional data.
  • Reasons: [Speaker 1] : Smartphones contain sensitive information like passwords, photos, and banking info, making them attractive targets.
2. How does the 'cherry blows' malware work?
  • Description: This malware can steal crypto wallet info from screenshots using optical character recognition (OCR).
  • Conclusion: The 'cherry blows' malware is a sophisticated threat that can compromise crypto wallets.
  • Reasons: [Speaker 2] : It uses OCR to scan screenshots for crypto wallet seed phrases.
3. What are the different types of mobile malware?
  • Description: Discussion on viruses, worms, and trojans, including the Anata Trojan.
  • Conclusion: Understanding different types of malware is crucial for protection.
  • Reasons: [Speaker 2] : Viruses, worms, and trojans have distinct behaviors and impacts.
4. What solutions exist to combat mobile malware?
  • Description: Discussion on awareness, app safety, phishing attacks, and technology like MDM and antivirus software.
  • Conclusion: A layered approach involving awareness, smart habits, and technology is essential.
  continue reading

149 episodios

كل الحلقات

×
 
Loading …

Bienvenido a Player FM!

Player FM está escaneando la web en busca de podcasts de alta calidad para que los disfrutes en este momento. Es la mejor aplicación de podcast y funciona en Android, iPhone y la web. Regístrate para sincronizar suscripciones a través de dispositivos.

 

Guia de referencia rapida

Escucha este programa mientras exploras
Reproducir