But we don't get down and dirty and talk about individual lines of code in our products. |
Generally, what we've seen is a form of compartmentalization, from the top down. |
It's got to be downloaded and run manually. It's not something that will just go from phone to phone with no interaction whatsoever. |
It's really easy to get this thing. The exploit will even work through a DOS box. |
obviously meant to make money. |
Places where there's a significant amount of activity usually have a technically advanced population and a large population of computer users. You also have a poor economy, so you have people with the technical skills to do good work, but they can't find a job that will provide for them, so they may have to resort to doing things that are against the law. |
Policies need to be established inside companies. |
The important thing about this Trojan is that it can get to any device that runs J2ME. |
The life that we had with the so-called pranksters instead of the pros is likely to end, ... If you exist as a business on the Internet, you should be greatly concerned. |
The life that we had with the so-called pranksters instead of the pros is likely to end. If you exist as a business on the Internet, you should be greatly concerned. |
The threat in its mildest forms -- which too often defy successful criminal prosecution -- results in disruption of day-to-day business, taking a significant toll on the profitability of companies of all sizes, |
There's no global outbreak going on. |
We now know that it's not only a threat to smart phones. All these regular phones that support J2ME are vulnerable and can become a major target. |
We'll start seeing viruses attacking Windows with the ability to infect Linux and Mac machines. It's not a stretch to imaging a single virus going across all three platforms and even further. |