The day before yesterday, a reporter from Beijing News used the numbers of 40 different industries, and found that any user can mark the information of others, and some of
, issued in 2012 by the rising China information security comprehensive report, the report detailed analysis of the 2012 China's information security market about viruses, malicious sites, phishing, personal privacy,
The Ministry of Industry and Information Technology conducted technical tests on more than 5.4 million mobile apps from 135 app stores last year, removing about 28,000 malicious apps and exposing
HP said in a security report last week that some of its network switches, which are already in use, contained malware in flash cards.
The popularity of the mobile Internet makes every field involving mobile phones full of variables, and the mobile phone security market is no exception.
There is no one-size-fits-all approach to creating a cyber threat model, just stay flexible and focus on who, what, why, how and when.