Artwork

المحتوى المقدم من wnguyen. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة wnguyen أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !

The Rise of Mobile Malware

18:43
 
مشاركة
 

Fetch error

Hmmm there seems to be a problem fetching this series right now. Last successful fetch was on January 20, 2025 03:20 (15d ago)

What now? This series will be checked again in the next hour. If you believe it should be working, please verify the publisher's feed link below is valid and includes actual episode links. You can contact support to request the feed be immediately fetched.

Manage episode 456149636 series 3606199
المحتوى المقدم من wnguyen. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة wnguyen أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
The Rise of Mobile Malware

Date & Time: 2024-12-14 20:43:57
Conversation with: [Speaker 2] [Speaker 1]

1. What is the impact of the rise of mobile malware?
  • Description: 71% of people use smartphones for work, making them targets for organized crime and sophisticated attacks.
  • Conclusion: Mobile malware poses a significant threat to personal and professional data.
  • Reasons: [Speaker 1] : Smartphones contain sensitive information like passwords, photos, and banking info, making them attractive targets.
2. How does the 'cherry blows' malware work?
  • Description: This malware can steal crypto wallet info from screenshots using optical character recognition (OCR).
  • Conclusion: The 'cherry blows' malware is a sophisticated threat that can compromise crypto wallets.
  • Reasons: [Speaker 2] : It uses OCR to scan screenshots for crypto wallet seed phrases.
3. What are the different types of mobile malware?
  • Description: Discussion on viruses, worms, and trojans, including the Anata Trojan.
  • Conclusion: Understanding different types of malware is crucial for protection.
  • Reasons: [Speaker 2] : Viruses, worms, and trojans have distinct behaviors and impacts.
4. What solutions exist to combat mobile malware?
  • Description: Discussion on awareness, app safety, phishing attacks, and technology like MDM and antivirus software.
  • Conclusion: A layered approach involving awareness, smart habits, and technology is essential.
  continue reading

149 حلقات

Artwork
iconمشاركة
 

Fetch error

Hmmm there seems to be a problem fetching this series right now. Last successful fetch was on January 20, 2025 03:20 (15d ago)

What now? This series will be checked again in the next hour. If you believe it should be working, please verify the publisher's feed link below is valid and includes actual episode links. You can contact support to request the feed be immediately fetched.

Manage episode 456149636 series 3606199
المحتوى المقدم من wnguyen. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة wnguyen أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
The Rise of Mobile Malware

Date & Time: 2024-12-14 20:43:57
Conversation with: [Speaker 2] [Speaker 1]

1. What is the impact of the rise of mobile malware?
  • Description: 71% of people use smartphones for work, making them targets for organized crime and sophisticated attacks.
  • Conclusion: Mobile malware poses a significant threat to personal and professional data.
  • Reasons: [Speaker 1] : Smartphones contain sensitive information like passwords, photos, and banking info, making them attractive targets.
2. How does the 'cherry blows' malware work?
  • Description: This malware can steal crypto wallet info from screenshots using optical character recognition (OCR).
  • Conclusion: The 'cherry blows' malware is a sophisticated threat that can compromise crypto wallets.
  • Reasons: [Speaker 2] : It uses OCR to scan screenshots for crypto wallet seed phrases.
3. What are the different types of mobile malware?
  • Description: Discussion on viruses, worms, and trojans, including the Anata Trojan.
  • Conclusion: Understanding different types of malware is crucial for protection.
  • Reasons: [Speaker 2] : Viruses, worms, and trojans have distinct behaviors and impacts.
4. What solutions exist to combat mobile malware?
  • Description: Discussion on awareness, app safety, phishing attacks, and technology like MDM and antivirus software.
  • Conclusion: A layered approach involving awareness, smart habits, and technology is essential.
  continue reading

149 حلقات

كل الحلقات

×
 
Loading …

مرحبًا بك في مشغل أف ام!

يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.

 

دليل مرجعي سريع

استمع إلى هذا العرض أثناء الاستكشاف
تشغيل