Integrated protection for smartphones

August 2009 Cyber Security

Kaspersky Lab has released Kaspersky Mobile Security 8.0, designed to protect smartphones from all types of IT threats as well as confidential data leaks from lost or stolen devices.

SMS Find can locate the exact whereabouts of a lost smartphone (for devices with GPS). After sending an SMS with a password to the lost device, the user receives a link to Google Maps containing its exact coordinates.

The Anti-theft module of Kaspersky Mobile Security 8.0 also makes it possible for the owner of a lost or stolen smartphone to remotely block access to or completely wipe the memory of the device by simply sending a codeword via SMS to his/her number.

If the SIM card is removed from a lost or stolen phone, the SIM Watch module in Kaspersky Mobile Security 8.0 sends a hidden message notifying the owner of the new number. This function ensures the owner can delete data from or block the smartphone no matter what the circumstances. Moreover, law enforcement agencies can use the new number to track down the stolen device and return it to its rightful owner.

Give sensitive and confidential information on your phone an added level of security. Kaspersky Mobile Security 8.0 provides a safe-folder within the smartphone whose contents are permanently encrypted and only accessible with a user-defined password. When the password is entered the folder will remain accessible to enhance usability until KMS detects a period of inactivity.

The parental control component enables parents to restrict the sending and receiving of messages to a child’s phone (eg, premium rate numbers, adult content services, etc). The solution’s SMS Find function also allows parents to locate their children if their smartphones have GPS.

The device also includes an improved anti-spam module. The spam filter not only blocks unsolicited messages but also calls, protecting users from fraudsters and obtrusive advertising. The new version can function in whitelist mode (only accepting calls and messages from specified contacts) or in blacklist mode (accepting calls and messages from all numbers except those in the list).

The antivirus scanner automatically scans all incoming and modified objects, it performs on-demand scans of the device. All malicious objects can be deleted or stored in quarantine. Regular updates of the antivirus databases via various channels, including synchronisation with a PC, ensure that new malicious programs are detected and deleted effectively.

The integrated firewall prevents attacks by hackers and mobile worms that spread via Bluetooth and Wi-Fi connections.

The new Kaspersky Lab application offering protection for smartphones was developed with all the compatibility requirements for Symbian OS 9.1, 9.2, 9.3 and Windows Mobile 5.0, 6.0, 6.1 in mind.

www.kaspersky.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Insights from the 2023 Cloud Security Report
News Cyber Security
Increased costs, compliance requirements, hybrid and multi-cloud complexities, reduced visibility, and a lack of skilled practitioners cause organisations to slow or adjust their cloud adoption strategies.

Read more...
New algorithm for OT cybersecurity risk management
Industrial (Industry) Cyber Security News Commercial (Industry)
OTORIO’s new risk management model and attack graph analysis algorithm technology, calculates OT cybersecurity threats and provides risk mitigation actions, prioritised according to actual exposure and potential impact on operations.

Read more...
Veeam finds 93% of cyberattacks target backup storage
Cyber Security
Veeam unveils the results of its 2023 Ransomware Trends Report, showing cyber insurance is becoming too expensive and 21% of organisations are unable to recover their data after paying the ransom.

Read more...
Cybersecurity providers must first protect themselves
Cyber Security
In a joint advisory released by cybersecurity agencies across the United States, UK, Australia, Canada and New Zealand, managed security service providers (MSSPs) have been warned of a sharp increase in cyberattacks targeting their systems.

Read more...
Cyber attackers used over 500 tools and tactics in 2022
Cyber Security News
The most common root causes of attacks were unpatched vulnerabilities and compromised credentials, while ransomware continues to be the most common ‘end game’ and attacker dwell time is shrinking – for better or worse.

Read more...
Addressing the SCADA in the room
Industrial (Industry) Cyber Security
Few other sectors command the breadth of purpose-built and custom devices necessary to function, as the industrial and manufacturing industries. These unique devices create an uncommon risk that must be assessed and understood to fully protect against incoming attacks.

Read more...
Recession or stress?
Cyber Security News
The economic landscape has seen many technology companies lay off vast numbers of employees, but for cybersecurity, the picture looks very different – a dynamic mixture of excitement, challenges and toxicity.

Read more...
Vulnerabilities in industrial cellular routers’ cloud management platforms
Industrial (Industry) Cyber Security Security Services & Risk Management
Research from OTORIO, a provider of operational technology cyber and digital risk management solutions, unveils cyber risks in M2M protocols and asset registration that expose hundreds of thousands of devices and OT networks to attack

Read more...
NEC XON appoints Armand Kruger as Head of Cybersecurity
News Cyber Security
NEC XON has announced the appointment of Armand Kruger as the Head of Cybersecurity. Kruger will oversee all cybersecurity offerings including cybersecurity strategy, programmes, and executive advisory.

Read more...
Caesar Tonkin new head of cybersecurity business, Armata
News Cyber Security
Vivica Holdings has announced the appointment of cybersecurity expert Caesar Tonkin to head up its cybersecurity business Armata, which provides technology solutions and niche expertise needed to help businesses better protect themselves.

Read more...