{"id":1332,"date":"2004-09-23T00:00:00","date_gmt":"2004-09-23T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/09\/23\/nokia-phone-adds-virus-protection\/"},"modified":"2021-12-30T11:39:11","modified_gmt":"2021-12-30T11:39:11","slug":"nokia-phone-adds-virus-protection","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/09\/23\/nokia-phone-adds-virus-protection\/","title":{"rendered":"Nokia Phone Adds Virus Protection"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>Upcoming smart phone will feature a mobile version of F-Secure&#8217;s antivirus software.<\/p>\n<p>Finnish mobile phone manufacturer Nokia will offer mobile antivirus software through F-Secure as one of the features in its new Nokia 6670 smart phone when it is released in October, the companies announced this week.<\/p>\n<p>The Symbian OS smart phones will provide on-device protection, similar in fashion to antivirus protection programs for PCs, with automatic over-the-air antivirus updates for a monthly fee.<\/p>\n<p>The software will not come loaded into the device, but can be downloaded from the F-Secure Web site, according to Nokia spokesperson Karoliina Lehmusvirta.<\/p>\n<p>The Nokia 6670 will be the first mobile phone in its Series 60 line to offer the mobile virus protection, though users of other Series 60 mobile phones will also be able to purchase the antivirus protection software, &#8220;perhaps as early as October,&#8221; Lehmusvirta says.<\/p>\n<p>F-Secure is also in talks with other handset manufacturers about offering similar antivirus protection, according to Matias Impivaara, business manager for mobile security services for F-Secure of Helsinki.<\/p>\n<p>&#8220;This announcement is a starting point for us and we have been testing the service with a variety of handsets from different vendors and in several operator networks,&#8221; Impivaara says.<\/p>\n<p>Nokia, based in Espoo, Finland, already offers antivirus software through F-Secure for its Communicator line of mobile devices, but Impivaara says the protection offered for the Nokia 6670 is a greatly improved version in terms of both features and pricing options.<\/p>\n<p>&#8220;The first general offering for the mobile antivirus software came a couple of years ago, but this version has a whole new infrastructure,&#8221; Impivaara says.<\/p>\n<p>&#8220;For example, it has a patented SMS [short message service] update mechanism and HTTPS [Hypertext Transport Protocol Secure] connections.<\/p>\n<p>Lehmusvirta stresses that there is nothing about the Nokia 6670 that makes it particularly susceptible to viruses and that Nokia knows of no capabilities within any of its devices that a virus might exploit.<\/p>\n<p>After a series of three malicious program targeting wireless devices were discovered in between June and August, security specialists stepped up their warnings of the pending possibility of serious attacks against mobile phones and PDAs.<\/p>\n<p>F-Secure claims its mobile antivirus software service is the first commercially available product for protecting Symbian OS smart phones but IDC analyst Paolo Pescatore says similar programs can be expected in the very near future.<\/p>\n<p>http:\/\/www.pcworld.com\/news\/article\/0,aid,117904,pg,1,RSS,RSS,00.asp<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1332","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1332","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1332"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1332\/revisions"}],"predecessor-version":[{"id":3819,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1332\/revisions\/3819"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}