{"id":645267,"date":"2013-03-05T07:55:40","date_gmt":"2013-03-05T12:55:40","guid":{"rendered":"http:\/\/bgr.com\/?p=359347"},"modified":"2013-03-05T07:55:40","modified_gmt":"2013-03-05T12:55:40","slug":"smartphones-malware-free-glory-days-may-soon-be-over","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/645267","title":{"rendered":"Smartphones\u2019 malware-free glory days may soon be over"},"content":{"rendered":"<p><center><a href=\"http:\/\/bgr.com\/2013\/03\/05\/smartphone-malware-analysis-359347\/\"><img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"489\" src=\"http:\/\/boygeniusreport.files.wordpress.com\/2012\/07\/android-robot-frankenstein.jpg?w=650&amp;h=489&amp;crop=1\" class=\"attachment-feed_normal wp-post-image\" alt=\"Smartphone Malware Analysis\" title=\"Android Robot\" \/><\/a><\/center>One downside of <a href=\"http:\/\/bgr.com\/2012\/03\/08\/former-top-microsoft-exec-of-course-we-are-in-a-post-pc-world\/\">shifting to a post-PC world<\/a> is the inevitable development and refinement of post-PC malware. <a href=\"http:\/\/www.technologyreview.com\/news\/512021\/clues-suggest-malware-is-moving-from-pcs-to-mobile-devices\/\"><em>Technology Review<\/em>\u00a0this week spoke with<\/a>\u00a0security researchers who say that they&#8217;re seeing an upgrade in both <a href=\"http:\/\/bgr.com\/2012\/12\/12\/android-malware-2013\/\">the quantity and sophistication of mobile malware attacks<\/a> as hackers try to create a winning formula for distributing malware to mobile devices. At the moment, the researchers say that cybercriminals are experimenting with injecting malware into popular mobile websites and quietly installing it onto users&#8217; devices whenever they visit compromised pages.<\/p>\n<p><a href=\"http:\/\/bgr.com\/2013\/03\/05\/smartphone-malware-analysis-359347\/?utm_source=more-link&#038;utm_medium=feed\" class=\"more-link\"><em>Continue reading&#8230;<\/em><\/a><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/TheBoyGeniusReport\/~4\/-PtIpU56RO8\" height=\"1\" width=\"1\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>One downside of shifting to a post-PC world is the inevitable development and refinement of post-PC malware. Technology Review\u00a0this week spoke with\u00a0security researchers who say that they&#8217;re seeing an upgrade in both the quantity and sophistication of mobile malware attacks as hackers try to create a winning formula for distributing malware to mobile devices. At [&hellip;]<\/p>\n","protected":false},"author":7438,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-645267","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/645267","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/7438"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=645267"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/645267\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=645267"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=645267"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=645267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}