{"id":47004,"date":"2011-12-04T04:43:08","date_gmt":"2011-12-04T00:43:08","guid":{"rendered":"http:\/\/www.phonezone.ru\/news\/mobile-malware-the-looming-security-storm\/"},"modified":"2011-12-04T04:43:08","modified_gmt":"2011-12-04T00:43:08","slug":"mobile-malware-the-looming-security-storm","status":"publish","type":"post","link":"https:\/\/phonezone.ru\/news\/mobile-malware-the-looming-security-storm\/","title":{"rendered":"Mobile Malware &amp; the Looming Security Storm"},"content":{"rendered":"<p>With many smartphones being equipped with the computing power of old laptops, security is becoming an increasingly important part of the wireless landscape as hackers and spammers turn their attention to mobile.<br \/>\n<a href=\"http:\/\/www.wirelessweek.com\/articles\/2011\/11\/mobile-malware-looming-security-storm-safety-and-security-mobile-content\/\">Mobile Malware &amp; the Looming Security Storm<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With many smartphones being equipped with the computing power of old laptops, security is becoming an increasingly important part of the wireless landscape as hackers and spammers turn their attention to mobile. Mobile Malware &amp; the Looming Security Storm<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"1","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[4],"tags":[],"class_list":["post-47004","post","type-post","status-publish","format-standard","hentry","category-devices"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mobile Malware &amp; the Looming Security Storm - \u041d\u043e\u0432\u043e\u0441\u0442\u0438 \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439<\/title>\n<meta name=\"description\" content=\"With many smartphones being equipped with the computing power of old laptops, security is becoming an increasingly important part of the wireless\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phonezone.ru\/news\/mobile-malware-the-looming-security-storm\/\" \/>\n<meta property=\"og:locale\" content=\"ru_RU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Malware &amp; the Looming Security Storm - \u041d\u043e\u0432\u043e\u0441\u0442\u0438 \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439\" \/>\n<meta property=\"og:description\" content=\"With many smartphones being equipped with the computing power of old laptops, security is becoming an increasingly important part of the wireless\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phonezone.ru\/news\/mobile-malware-the-looming-security-storm\/\" \/>\n<meta property=\"og:site_name\" content=\"\u041d\u043e\u0432\u043e\u0441\u0442\u0438 \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439\" \/>\n<meta property=\"article:published_time\" content=\"2011-12-04T00:43:08+00:00\" \/>\n<meta name=\"author\" content=\"Mobile news chief editor\" \/>\n<meta name=\"twitter:label1\" content=\"\u041d\u0430\u043f\u0438\u0441\u0430\u043d\u043e \u0430\u0432\u0442\u043e\u0440\u043e\u043c\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mobile news chief editor\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/phonezone.ru\\\/news\\\/mobile-malware-the-looming-security-storm\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phonezone.ru\\\/news\\\/mobile-malware-the-looming-security-storm\\\/\"},\"author\":{\"name\":\"Mobile news chief editor\",\"@id\":\"https:\\\/\\\/phonezone.ru\\\/news\\\/#\\\/schema\\\/person\\\/659775c2c0130cf3d639e6e8c0aede94\"},\"headline\":\"Mobile Malware &amp; the Looming Security Storm\",\"datePublished\":\"2011-12-04T00:43:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/phonezone.ru\\\/news\\\/mobile-malware-the-looming-security-storm\\\/\"},\"wordCount\":46,\"commentCount\":0,\"articleSection\":[\"Devices\"],\"inLanguage\":\"ru-RU\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/phonezone.ru\\\/news\\\/mobile-malware-the-looming-security-storm\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/phonezone.ru\\\/news\\\/mobile-malware-the-looming-security-storm\\\/\",\"url\":\"https:\\\/\\\/phonezone.ru\\\/news\\\/mobile-malware-the-looming-security-storm\\\/\",\"name\":\"Mobile Malware &amp; the Looming Security Storm - \u041d\u043e\u0432\u043e\u0441\u0442\u0438 \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phonezone.ru\\\/news\\\/#website\"},\"datePublished\":\"2011-12-04T00:43:08+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/phonezone.ru\\\/news\\\/#\\\/schema\\\/person\\\/659775c2c0130cf3d639e6e8c0aede94\"},\"description\":\"With many smartphones being equipped with the computing power of old laptops, security is becoming an increasingly important part of the wireless\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/phonezone.ru\\\/news\\\/mobile-malware-the-looming-security-storm\\\/#breadcrumb\"},\"inLanguage\":\"ru-RU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/phonezone.ru\\\/news\\\/mobile-malware-the-looming-security-storm\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/phonezone.ru\\\/news\\\/mobile-malware-the-looming-security-storm\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u0413\u043b\u0430\u0432\u043d\u043e\u0435 \u043c\u0435\u043d\u044e\",\"item\":\"https:\\\/\\\/phonezone.ru\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Malware &amp; the Looming Security Storm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/phonezone.ru\\\/news\\\/#website\",\"url\":\"https:\\\/\\\/phonezone.ru\\\/news\\\/\",\"name\":\"\u041d\u043e\u0432\u043e\u0441\u0442\u0438 \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439\",\"description\":\"\u041d\u043e\u0432\u043e\u0441\u0442\u043d\u0430\u044f \u043b\u0435\u043d\u0442\u0430: \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0435 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0438\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/phonezone.ru\\\/news\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ru-RU\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/phonezone.ru\\\/news\\\/#\\\/schema\\\/person\\\/659775c2c0130cf3d639e6e8c0aede94\",\"name\":\"Mobile news chief editor\",\"url\":\"https:\\\/\\\/phonezone.ru\\\/news\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobile Malware &amp; the Looming Security Storm - \u041d\u043e\u0432\u043e\u0441\u0442\u0438 \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439","description":"With many smartphones being equipped with the computing power of old laptops, security is becoming an increasingly important part of the wireless","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phonezone.ru\/news\/mobile-malware-the-looming-security-storm\/","og_locale":"ru_RU","og_type":"article","og_title":"Mobile Malware &amp; the Looming Security Storm - \u041d\u043e\u0432\u043e\u0441\u0442\u0438 \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439","og_description":"With many smartphones being equipped with the computing power of old laptops, security is becoming an increasingly important part of the wireless","og_url":"https:\/\/phonezone.ru\/news\/mobile-malware-the-looming-security-storm\/","og_site_name":"\u041d\u043e\u0432\u043e\u0441\u0442\u0438 \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439","article_published_time":"2011-12-04T00:43:08+00:00","author":"Mobile news chief editor","twitter_misc":{"\u041d\u0430\u043f\u0438\u0441\u0430\u043d\u043e \u0430\u0432\u0442\u043e\u0440\u043e\u043c":"Mobile news chief editor"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/phonezone.ru\/news\/mobile-malware-the-looming-security-storm\/#article","isPartOf":{"@id":"https:\/\/phonezone.ru\/news\/mobile-malware-the-looming-security-storm\/"},"author":{"name":"Mobile news chief editor","@id":"https:\/\/phonezone.ru\/news\/#\/schema\/person\/659775c2c0130cf3d639e6e8c0aede94"},"headline":"Mobile Malware &amp; the Looming Security Storm","datePublished":"2011-12-04T00:43:08+00:00","mainEntityOfPage":{"@id":"https:\/\/phonezone.ru\/news\/mobile-malware-the-looming-security-storm\/"},"wordCount":46,"commentCount":0,"articleSection":["Devices"],"inLanguage":"ru-RU","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/phonezone.ru\/news\/mobile-malware-the-looming-security-storm\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/phonezone.ru\/news\/mobile-malware-the-looming-security-storm\/","url":"https:\/\/phonezone.ru\/news\/mobile-malware-the-looming-security-storm\/","name":"Mobile Malware &amp; the Looming Security Storm - \u041d\u043e\u0432\u043e\u0441\u0442\u0438 \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439","isPartOf":{"@id":"https:\/\/phonezone.ru\/news\/#website"},"datePublished":"2011-12-04T00:43:08+00:00","author":{"@id":"https:\/\/phonezone.ru\/news\/#\/schema\/person\/659775c2c0130cf3d639e6e8c0aede94"},"description":"With many smartphones being equipped with the computing power of old laptops, security is becoming an increasingly important part of the wireless","breadcrumb":{"@id":"https:\/\/phonezone.ru\/news\/mobile-malware-the-looming-security-storm\/#breadcrumb"},"inLanguage":"ru-RU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phonezone.ru\/news\/mobile-malware-the-looming-security-storm\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/phonezone.ru\/news\/mobile-malware-the-looming-security-storm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0413\u043b\u0430\u0432\u043d\u043e\u0435 \u043c\u0435\u043d\u044e","item":"https:\/\/phonezone.ru\/news\/"},{"@type":"ListItem","position":2,"name":"Mobile Malware &amp; the Looming Security Storm"}]},{"@type":"WebSite","@id":"https:\/\/phonezone.ru\/news\/#website","url":"https:\/\/phonezone.ru\/news\/","name":"\u041d\u043e\u0432\u043e\u0441\u0442\u0438 \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439","description":"\u041d\u043e\u0432\u043e\u0441\u0442\u043d\u0430\u044f \u043b\u0435\u043d\u0442\u0430: \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0435 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0438","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phonezone.ru\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ru-RU"},{"@type":"Person","@id":"https:\/\/phonezone.ru\/news\/#\/schema\/person\/659775c2c0130cf3d639e6e8c0aede94","name":"Mobile news chief editor","url":"https:\/\/phonezone.ru\/news\/author\/admin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/phonezone.ru\/news\/wp-json\/wp\/v2\/posts\/47004","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phonezone.ru\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phonezone.ru\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phonezone.ru\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/phonezone.ru\/news\/wp-json\/wp\/v2\/comments?post=47004"}],"version-history":[{"count":0,"href":"https:\/\/phonezone.ru\/news\/wp-json\/wp\/v2\/posts\/47004\/revisions"}],"wp:attachment":[{"href":"https:\/\/phonezone.ru\/news\/wp-json\/wp\/v2\/media?parent=47004"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phonezone.ru\/news\/wp-json\/wp\/v2\/categories?post=47004"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phonezone.ru\/news\/wp-json\/wp\/v2\/tags?post=47004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}