Friday 2 December 2011

Cell Phone Viruses

Software Engineers Allow PCs to Scan Mobile Devices for Viruses

PITTSBURGH--It takes constant vigilance to combat the viruses that persistently lurk in cyber space. While we all know our PCs are vulnerable to data loss, you might be surprised to find out so is your cell phone! A new technology could be the key to ferreting out electronic viruses forever.
That fancy cell phone you use to surf the Web and check e-mail could be infected with a computer virus.
"Our cell phones are becoming more and more sophisticated to look more and more like regular computers, and so they can also acquire viruses," says Adrian Perrig, an assistant professor of engineering at Carnegie Mellon University in Pittsburgh.
While most of us take steps to safeguard our PCs, cell phone viruses are so new you might not even know about them. Engineers at Carnegie Mellon University found a key to detecting even the most evasive electronic bugs.
Perrig says, "Our technique is called SoftWare-based ATTestation, which allows an external host -- like the laptop computer or even another cell phone -- allows them to look into the memory of a device in a way that even malicious code executing on the device cannot hide."
Traditional anti-virus programs scan for a list of known threats, but if a threat is not on the list, it's not detected. With software-based attestation -- SWATT for short -- there's no virus roster. Rather it scans the memory of a handheld device. Because all viruses must dwell in memory, any deviation signals a potential virus.
Right now SWATT only detects bugs. Once they figure out how to exterminate them, it will go on the market. In addition to computers, PDAs and cell phones, this software can detect viruses in any communication device, even the navigation systems of luxury cars.
There are several different ways a computer can become infected. A virus is a small piece of software that attaches itself to an existing program. Every time that program is executed, the virus starts up, too, and can reproduce by attaching itself to even more programs. When contained in an email, the virus usually replicates by automatically mailing itself to dozens of people listed in the victim's email address book

0 comments:

Post a Comment

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Affiliate Network Reviews