3. • We use our Android phones in daily basis and we are
android lovers.
• Each and every one has some or the other information in
the respective phone. Be it personal or not.
• Our personal details like contacts, schedules,
appointments, mails this all are really important as these
informations are directly or indirectly connected with us
mentally , socially , economically , as well as physically.
• Most of the users will always look for no one can access
their phone data.
4.
5.
6.
7.
8.
9.
10. • Malware, short for “malicious software”, is any software used to
disrupt computer operation , gather sensitive information , or gain
access to private computer system.
• It includes “Computer Viruses” , “Worms” , “Trojan Horses” ,
“Ransomware” , “Spyware” , “Adware” , “Scareware” , and other
malicious programs.
• It can take the form of executable code , script , active content
and other.
18. • Your Android smartphone may look innocent. But when
compromised by malware, it can illegally watch and
impersonate you, participate in dangerous botnet
activities, capture your personal data, and even steal
your money.
19.
20. • Linux is a targeted platform because Linux servers are so widely used to run
websites and deliver web content.
21. • While we saw no high-profile attacks against Mac OS X this year, we
did detect a steady stream of modest, creative and diverse attacks
that make it wise for Mac users to keep their guard up.
22. • Dangerous, difficult-to-detect web server attacks and exploit kits broadened in
2013, leading to more drive-by attacks against vulnerable web clients.
23. • We are seeing more persistent, targeted attacks—and many
seem to be aimed at compromising financial accounts.
24. • Starting in April 2014, no new patches will be available for Windows XP and Office 2003.
Meanwhile, Windows patching has emerged as a significant issue in specialized markets
such as point-of-sale and medical equipment.