Fighting Malware on the Smartphone

Contact
No contact information submitted.
Sidebar Content
No sidebar content submitted.
Summaries

Summary Sentence:

No summary sentence submitted.

Full Summary:

As more people bring personal technology to work—most often smartphones—malicious code writers are targeting these weak points of entry. In its 2009 Cyber Threat Report, the Georgia Tech Information Security Center said botnets could move from the desktop to the smartphone within the year. Source: Washington Post

Related Links

Additional Information

Groups

College of Computing

Categories
No categories were selected.
Related Core Research Areas
No core research areas were selected.
Newsroom Topics
No newsroom topics were selected.
Keywords
No keywords were submitted.
Status
  • Created By: Louise Russo
  • Workflow Status: Published
  • Created On: Feb 9, 2010 - 4:40pm
  • Last Updated: Oct 7, 2016 - 11:04pm