13 countries around the world on cyber Security Company Kasper sky Lab 015 is the third and final report in accordance with the Bangladesh mobile phone topped cyber risk. (Favorite Tech) 13 countries of the world, cyber security company, Kasper sky Lab 015 is the third and final report, “IT Threat Evolution in the queue Fifty Three Thousand Two ‘has topped a list of the phone vulnerable to cyber Bangladesh (at least 1 in every 4 devices here). According to the report, 13 countries and the US 19th in terms of computer virus attacks. And 64.44 percent of the local and regional virus virus. As Bangladesh is the most vulnerable region in terms of virus infection.
The report has been mentioned, the majority of the Security Threat and mobile melancholy the highest rates of mobile of Bangladesh has emerged as the country’s first cyber risks. Kasper sky Lab’s malware-expert Tim Armstrong said in this regard, mobile malware hackers are trying to make money on the spread of the virus. He said that last year (014 AD) compared to the year (015 AD), the mobile phone virus spreads rapidly spreading malware.
Bangladesh Telecommunication Regulatory Commission (BTRC) last (December 015), according to the report the number of mobile phone users in the country of 37 million 0 13 million. The number of users of mobile Internet 5 million to 14 million 53 thousand. A large part due to the use of mobile Internet in the world of cyber-criminals are more attention.
Meanwhile Thrijira faster browsing service and value smartphones within reach of the common man as the mobile forgotten ordinary people are being affected. Viruses are connected to the mobile content mobile malware. Generally mobile phone while browsing any website banned advertising, slow or such warning system, to find any music or video files in different formats of the show or be downloaded from the starting of the reason is the mobile melancholy.
Security students says, is like a computer virus infected spam handset status. The antivirus is available in the market, but now the virus is transmitted from the handset to keep is not nearly as capable said. Georgia Institute of Technology Information Security Center) published its annual report on emerging cyber threats, The more number of users will use their smartphones, the more applications will be used, and other financial transactions, through which cyber criminals will be able to more crime.
In addition, in many ways the virus is being spread mobile add-on. Early computer viruses, which is why he would like it was very easy to detect and block. But this is risky MP spam or three files, picture files, or disguise of the national media, which is due to the user’s spam and what is not spam, it becomes difficult to detect.
Track malware and security software for mobile phones and provided a company official Connie said adaptive, adaptive Mobile has identified a particular virus, called crime. It can be spread in two ways. First, it can attack disguised as MMS. Phone using Bluetooth wireless technology or mobile phone, it can enter into the search function. Airborne virus is a virus or virus adaptive mobile phone.
Connie says, should ordinary computer users to be free from viruses is that there remain alert, warning that the use of mobile phones were adopted. He said, for the security of the computer, which is what we do, everything should be the same for mobile security. Open file attachments from strangers, especially before anyone thought better of it. In addition, be sure that your phone Bluetooth technology (Bluetooth visibility off) are. The mobile virus threat is driving the fastest and file attachments, and Bluetooth wireless technology.
However, a separate company called F-Secure, says the researcher, the growth of mobile viruses is decreasing day by day. He said because mobile phone companies, and they are constantly vigilant enough in their new models are made handsets for the bill-in security system. However, he said, will not be affected by mobile malware in the entire depending on the user’s caution.
According to the researchers, the chances of recovery and to strengthen mobile security for all mobile phone makers, operators and application developers will have to work together. The average life cycle of mobile devices in just two years, almost ten-year life cycle, where each computer. Therefore, to secure a two-year low at the mobile phone to mobile phone security should be further strengthened.