{"id":538,"date":"2004-09-29T09:24:00","date_gmt":"2004-09-29T09:24:00","guid":{"rendered":"http:\/\/markwilson.me.uk\/blog\/2004\/09\/protection-against-mobile-malware.htm"},"modified":"2007-05-15T14:10:32","modified_gmt":"2007-05-15T13:10:32","slug":"protection-against-mobile-malware","status":"publish","type":"post","link":"https:\/\/www.markwilson.co.uk\/blog\/2004\/09\/protection-against-mobile-malware.htm","title":{"rendered":"Protection against mobile malware"},"content":{"rendered":"<p><!--109645295668810971-->As mobile phones offer more and more computing functionality, anti-virus technologies for smartphones have become an inevitable reality.<\/p>\n<p>Back in June 2004, <a href=\"http:\/\/www.sophos.com\/virusinfo\/analyses\/symbcabira.html\">the Symb\/Cabir-A worm<\/a> was released (<a href=\"http:\/\/news.bbc.co.uk\/1\/hi\/technology\/3809855.stm\">as reported by the BBC<\/a> and others). The target is the Symbian operating system &#8211; just as for Windows on a PC, virus-writers and hackers will attack the largest user base first.<\/p>\n<p><em>Let&#8217;s face it &#8211; no hacker will get any credit for exploiting a security hole in something obscure &#8211; that&#8217;s why Microsoft gets so much bad security press and Linux and Macintosh users say &#8220;my system is secure&#8221; &#8211; in reality they are probably no more secure than a well-configured Windows system, just not such a target.<\/em><\/p>\n<p>According to <a href=\"http:\/\/www.pcworld.com\/resource\/printable\/article\/0,aid,117904,00.asp\">an article at the PC World website<\/a>, Nokia are addressing the issue by teaming up with F-Secure to offer subscription-based anti-virus protection for their Series 60 smartphones, starting with the forthcoming Nokia 6670. Quoting from <a href=\"http:\/\/www.nokia.com\/nokia\/0,,63955,00.html\">Nokia<\/a>:<\/p>\n<blockquote><p>&#8220;F-Secure Mobile Anti-Virus is available for the Nokia 6670 imaging smartphone, providing automatic, transparent real-time protection against harmful content locally on the mobile phone. Updating the phone&#8217;s virus database can be done either over an HTTPS connection or, in critical cases, by SMS message.&#8221;<\/p><\/blockquote>\n<p>Cabir uses <a href=\"http:\/\/www.sophos.com\/virusinfo\/articles\/bluejack.html\">bluejacking<\/a> as a mechanism to spread and as most people are oblivious (no nice IT department managing the security of consumer mobile phones!), the best advice I can give is to set your phone to <em>undiscoverable<\/em> or <em>hidden<\/em>. There is also <a href=\"http:\/\/www.nokia.com\/nokia\/0,,60350,00.html\">some advice on &#8220;mobile malware&#8221; at the Nokia website<\/a>.<\/p>\n<p>You can <a href=\"http:\/\/www.bluejackq.com\/\">learn more about Bluejacking at the BluejackQ website<\/a>. To make matters worse, <a href=\"http:\/\/www.planningaboveandbeyond.com\/Downloads\/rainier_pr_bluejacking_white_paper.pdf\">a colleague of mine found this document<\/a>, which suggests some people are thinking of using it as a marketing channel.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As mobile phones offer more and more computing functionality, anti-virus technologies for smartphones have become an inevitable reality. Back in June 2004, the Symb\/Cabir-A worm was released (as reported by the BBC and others). The target is the Symbian operating system &#8211; just as for Windows on a PC, virus-writers and hackers will attack the &hellip; <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2004\/09\/protection-against-mobile-malware.htm\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Protection against mobile malware<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[],"tags":[62,18],"class_list":["post-538","post","type-post","status-publish","format-standard","hentry","tag-malware","tag-mobility"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protection against mobile malware - markwilson.it<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.markwilson.co.uk\/blog\/2004\/09\/protection-against-mobile-malware.htm\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protection against mobile malware - markwilson.it\" \/>\n<meta property=\"og:description\" content=\"As mobile phones offer more and more computing functionality, anti-virus technologies for smartphones have become an inevitable reality. Back in June 2004, the Symb\/Cabir-A worm was released (as reported by the BBC and others). The target is the Symbian operating system &#8211; just as for Windows on a PC, virus-writers and hackers will attack the &hellip; Continue reading Protection against mobile malware\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.markwilson.co.uk\/blog\/2004\/09\/protection-against-mobile-malware.htm\" \/>\n<meta property=\"og:site_name\" content=\"markwilson.it\" \/>\n<meta property=\"article:published_time\" content=\"2004-09-29T09:24:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2007-05-15T13:10:32+00:00\" \/>\n<meta name=\"author\" content=\"Mark Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:site\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2004\\\/09\\\/protection-against-mobile-malware.htm#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2004\\\/09\\\/protection-against-mobile-malware.htm\"},\"author\":{\"name\":\"Mark Wilson\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"headline\":\"Protection against mobile malware\",\"datePublished\":\"2004-09-29T09:24:00+00:00\",\"dateModified\":\"2007-05-15T13:10:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2004\\\/09\\\/protection-against-mobile-malware.htm\"},\"wordCount\":288,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"keywords\":[\"Malware\",\"Mobility\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2004\\\/09\\\/protection-against-mobile-malware.htm#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2004\\\/09\\\/protection-against-mobile-malware.htm\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2004\\\/09\\\/protection-against-mobile-malware.htm\",\"name\":\"Protection against mobile malware - markwilson.it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\"},\"datePublished\":\"2004-09-29T09:24:00+00:00\",\"dateModified\":\"2007-05-15T13:10:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2004\\\/09\\\/protection-against-mobile-malware.htm#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2004\\\/09\\\/protection-against-mobile-malware.htm\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2004\\\/09\\\/protection-against-mobile-malware.htm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protection against mobile malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/\",\"name\":\"markwilson.it\",\"description\":\"get-info -class technology | write-output &gt; \\\/dev\\\/web\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\",\"name\":\"Mark Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"width\":800,\"height\":800,\"caption\":\"Mark Wilson\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\"},\"description\":\"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.\",\"sameAs\":[\"http:\\\/\\\/www.markwilson.co.uk\\\/\",\"https:\\\/\\\/www.instagram.com\\\/markwilsonuk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/markawilson\\\/\",\"https:\\\/\\\/x.com\\\/markwilsonit\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCWHlZCoHRTocdvtrOJ2IL4A\"],\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/author\\\/mark-wilson\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protection against mobile malware - markwilson.it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.markwilson.co.uk\/blog\/2004\/09\/protection-against-mobile-malware.htm","og_locale":"en_GB","og_type":"article","og_title":"Protection against mobile malware - markwilson.it","og_description":"As mobile phones offer more and more computing functionality, anti-virus technologies for smartphones have become an inevitable reality. Back in June 2004, the Symb\/Cabir-A worm was released (as reported by the BBC and others). The target is the Symbian operating system &#8211; just as for Windows on a PC, virus-writers and hackers will attack the &hellip; Continue reading Protection against mobile malware","og_url":"https:\/\/www.markwilson.co.uk\/blog\/2004\/09\/protection-against-mobile-malware.htm","og_site_name":"markwilson.it","article_published_time":"2004-09-29T09:24:00+00:00","article_modified_time":"2007-05-15T13:10:32+00:00","author":"Mark Wilson","twitter_card":"summary_large_image","twitter_creator":"@markwilsonit","twitter_site":"@markwilsonit","twitter_misc":{"Written by":"Mark Wilson","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.markwilson.co.uk\/blog\/2004\/09\/protection-against-mobile-malware.htm#article","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2004\/09\/protection-against-mobile-malware.htm"},"author":{"name":"Mark Wilson","@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"headline":"Protection against mobile malware","datePublished":"2004-09-29T09:24:00+00:00","dateModified":"2007-05-15T13:10:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2004\/09\/protection-against-mobile-malware.htm"},"wordCount":288,"commentCount":0,"publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"keywords":["Malware","Mobility"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.markwilson.co.uk\/blog\/2004\/09\/protection-against-mobile-malware.htm#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.markwilson.co.uk\/blog\/2004\/09\/protection-against-mobile-malware.htm","url":"https:\/\/www.markwilson.co.uk\/blog\/2004\/09\/protection-against-mobile-malware.htm","name":"Protection against mobile malware - markwilson.it","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#website"},"datePublished":"2004-09-29T09:24:00+00:00","dateModified":"2007-05-15T13:10:32+00:00","breadcrumb":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2004\/09\/protection-against-mobile-malware.htm#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.markwilson.co.uk\/blog\/2004\/09\/protection-against-mobile-malware.htm"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.markwilson.co.uk\/blog\/2004\/09\/protection-against-mobile-malware.htm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.markwilson.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Protection against mobile malware"}]},{"@type":"WebSite","@id":"https:\/\/www.markwilson.co.uk\/blog\/#website","url":"https:\/\/www.markwilson.co.uk\/blog\/","name":"markwilson.it","description":"get-info -class technology | write-output &gt; \/dev\/web","publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.markwilson.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468","name":"Mark Wilson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","url":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","width":800,"height":800,"caption":"Mark Wilson"},"logo":{"@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1"},"description":"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.","sameAs":["http:\/\/www.markwilson.co.uk\/","https:\/\/www.instagram.com\/markwilsonuk\/","https:\/\/www.linkedin.com\/in\/markawilson\/","https:\/\/x.com\/markwilsonit","https:\/\/www.youtube.com\/channel\/UCWHlZCoHRTocdvtrOJ2IL4A"],"url":"https:\/\/www.markwilson.co.uk\/blog\/author\/mark-wilson"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":736,"url":"https:\/\/www.markwilson.co.uk\/blog\/2007\/03\/this-is-how-easy-it-is-to-fall-into-the-malware-trap.htm","url_meta":{"origin":538,"position":0},"title":"This is how easy it is to fall into the malware trap","author":"Mark Wilson","date":"Friday 9 March 2007","format":false,"excerpt":"Last year, I wrote about the perils of being an IT professional - namely being expected to fix family and friends' PCs for free... well, for the last 24 hours, I've been removing malware from what was possibly the worst-infected PC I've ever seen! Some time ago, I gave an\u2026","rel":"","context":"In \"Malware\"","block_context":{"text":"Malware","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/malware"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6085,"url":"https:\/\/www.markwilson.co.uk\/blog\/2015\/09\/dont-waste-time-money-third-party-security-software-windows-defender-just-fine.htm","url_meta":{"origin":538,"position":1},"title":"Don&#8217;t waste time and money on third party security software: Windows Defender is just fine!","author":"Mark Wilson","date":"Sunday 27 September 2015","format":false,"excerpt":"So far in my \"series\" of Windows 10 posts, I've written about refreshing or resetting the PC\u00a0(to get a clean configuration)\u00a0and about getting an Office 365 Home subscription for some productivity apps but\u00a0I\u00a0skipped\u00a0one area that many people are sold products for... security\u00a0software. Actually, this is one of my major bug-bears.\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"Windows 10 Control Panel - Security and Maintenance","src":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/images\/win10-security-maintenance.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/images\/win10-security-maintenance.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/images\/win10-security-maintenance.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":81,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/spyware-re-enforces-need-for-network.htm","url_meta":{"origin":538,"position":2},"title":"Spyware re-enforces the need for network segmentation and remediation","author":"Mark Wilson","date":"Thursday 31 March 2005","format":false,"excerpt":"There is no doubt that malicious software (malware) is on the increase. We have learnt how to deal with the ever increasing number of viruses, worms and Trojan horses, but spyware is now a major problem too. Earlier this month, it was widely reported how a joint investigation by law\u2026","rel":"","context":"In \"Malware\"","block_context":{"text":"Malware","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/malware"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":461,"url":"https:\/\/www.markwilson.co.uk\/blog\/2006\/07\/windows-mobile-device-security.htm","url_meta":{"origin":538,"position":3},"title":"Windows Mobile device security","author":"Mark Wilson","date":"Thursday 13 July 2006","format":false,"excerpt":"Over the years, I've attended various presentations featuring mobile access to data but most of them have been along the lines of \"look at all this cool stuff I can do\". Last week I was at the Microsoft IT Security Summit and saw a slightly different angle on things as\u2026","rel":"","context":"In \"Microsoft Windows Mobile\"","block_context":{"text":"Microsoft Windows Mobile","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/windows-mobile"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":230,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/08\/quiet-news-day.htm","url_meta":{"origin":538,"position":4},"title":"A quiet news day?","author":"Mark Wilson","date":"Thursday 18 August 2005","format":false,"excerpt":"Today must be a \"quiet news day\". We see precious little IT news in the national press, and I know it's the middle of August, but Metro, the UK's free newspaper for commuters in and out of our major cities, is really scraping the barrel with its IT reporting this\u2026","rel":"","context":"In \"Malware\"","block_context":{"text":"Malware","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/malware"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":873,"url":"https:\/\/www.markwilson.co.uk\/blog\/2007\/08\/forefront-client-security.htm","url_meta":{"origin":538,"position":5},"title":"Forefront Client Security","author":"Mark Wilson","date":"Tuesday 7 August 2007","format":false,"excerpt":"A couple of years back, Microsoft bought a load of security companies and since then we've seen them continue to offer FrontBridge services as Microsoft Exchange Hosted Services; Windows Defender was born out of the previous Giant Company anti-spyware product, and a couple of months back they released Forefront Client\u2026","rel":"","context":"In \"Malware\"","block_context":{"text":"Malware","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/malware"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/538","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=538"}],"version-history":[{"count":0,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/538\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=538"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=538"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=538"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}