{"id":718,"date":"2006-01-05T00:00:00","date_gmt":"2006-01-05T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/01\/05\/mobile-malware-phishing-activities-to-surge-in-2006\/"},"modified":"2021-12-30T11:38:02","modified_gmt":"2021-12-30T11:38:02","slug":"mobile-malware-phishing-activities-to-surge-in-2006","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/01\/05\/mobile-malware-phishing-activities-to-surge-in-2006\/","title":{"rendered":"Mobile malware, phishing activities to surge in 2006"},"content":{"rendered":"<p>VIRUS writers have found a new playground: the extremely pervasive mobile phones.  According to the McAfee AVERT (Anti-Virus and Emergency Response Team) Labs, the rapid evolution of smartphone technology and the growing use of converged mobile devices will fuel the rise in the number of mobile malware in 2006.  Mobile phone viruses would be particularly prevalent this year as virus writers take advantage of the proliferation of mobile devices and the fact that users were less likely to install mobile security solutions, the antivirus firm said.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The perception that the threat of mobile malware was much less than that of its PC counterpart would encourage virus writers to come up with even more sophisticated threats, the McAfee AVERT Labs added.<\/p>\n<p>Apart from mobile malware, phishing scams would also continue to rise this year, with attacks to become more targeted through the use of spyware programs and password stealers, McAfee AVERT Labs said.<\/p>\n<p>http:\/\/news.inq7.net\/infotech\/index.php?index=1&#038;story_id=62081<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-718","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/718","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=718"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/718\/revisions"}],"predecessor-version":[{"id":3205,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/718\/revisions\/3205"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=718"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=718"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}