We have seen hacking via internet. Now hacking has entered into the field of mobile network. This dreadful process involves the transfer of mp3 files through MMS. These files are provided with attracting headers which kindles the user to open and see the contents. As soon as the file is opened a malware attacks the mobile of the user. This alarming activity destroys our mobile and after this incident the mobile will not be available for our use. Greatest damage that will be done by the malware is that it makes search on the affected phone and transfers all the personal information to a public repository. The search ends after it has acquired all the contacts from the phone book of the malware infected mobile. Then it transfers the malware to all the numbers that is stored in the mobile. This induces the avalanche affect and it is in its way to produce more affected mobiles. Make sure that you don’t open MMS that is sent from any unknown sender.
20 February 2008
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment