Fighting Malware on the Smartphone

No contact information submitted.
Sidebar Content
No sidebar content submitted.

Summary Sentence:

No summary sentence submitted.

Full Summary:

As more people bring personal technology to work—most often smartphones—malicious code writers are targeting these weak points of entry. In its 2009 Cyber Threat Report, the Georgia Tech Information Security Center said botnets could move from the desktop to the smartphone within the year. Source: Washington Post

Related Links

Additional Information


College of Computing

No categories were selected.
Related Core Research Areas
No core research areas were selected.
Newsroom Topics
No newsroom topics were selected.
No keywords were submitted.
  • Created By: Louise Russo
  • Workflow Status: Published
  • Created On: Feb 9, 2010 - 4:40pm
  • Last Updated: Oct 7, 2016 - 11:04pm