<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.element14.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>Malware may threaten businesses' wireless communications</title><link>https://community.element14.com/learn/publications/w/documents/7421/malware-may-threaten-businesses-wireless-communications</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>Malware may threaten businesses' wireless communications</title><link>https://community.element14.com/learn/publications/w/documents/7421/malware-may-threaten-businesses-wireless-communications</link><pubDate>Thu, 07 Oct 2021 07:24:20 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:993a3909-a8ee-4155-bfec-25a025a12724</guid><dc:creator>e14news</dc:creator><comments>https://community.element14.com/learn/publications/w/documents/7421/malware-may-threaten-businesses-wireless-communications#comments</comments><description>Current Revision posted to Documents by e14news on 10/7/2021 7:24:20 AM&lt;br /&gt;
&lt;span&gt;Businesses with a wireless communications network in place could find their systems under threat due to malware and social networking attacks.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;Sebastian Zabala, country manager for the UK and Sweden at Panda Security, says threats arising from social media sites could become relatively sophisticated.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;For instance, he suggests that human attackers can monitor people&amp;amp;#39;s profiles, determine what type of contact they are most responsive to and then approach them accordingly.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;This could be through an interest group such as a shared hobby, making any new contact on sites like Facebook into a potential threat.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;Meanwhile, businesses are advised to put in place processes to scan information sent over wired or wireless communications networks for evidence of malware.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;Protecting the system through &amp;amp;quot;technical applications&amp;amp;quot; including malware scanners, while imposing sensible restrictions on social networking activity, can combine to make sure that the threat of any serious infringement on security is minimised, Mr Zabala concludes.&lt;/span&gt;&lt;a href="http://feeds.directnews.co.uk/feedtrack/justcopyright.gif?feedid=1785&amp;amp;itemid=800208242"&gt;&lt;img alt="ADNFCR-1785-ID-800208242-ADNFCR" src="http://feeds.directnews.co.uk/feedtrack/justcopyright.gif?feedid=1785&amp;amp;itemid=800208242" /&gt;&lt;/a&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item></channel></rss>