{"id":10019,"date":"2009-07-19T20:01:00","date_gmt":"2009-07-20T00:01:00","guid":{"rendered":"http:\/\/www.hothardware.com\/News\/New-Sexy-View-Malware-Targets-Mobile-Devices"},"modified":"2009-07-19T20:01:00","modified_gmt":"2009-07-20T00:01:00","slug":"new-sexy-view-malware-targets-mobile-devices","status":"publish","type":"post","link":"https:\/\/computerhunter.us\/?p=10019","title":{"rendered":"New &#8220;Sexy View&#8221; Malware Targets Mobile Devices"},"content":{"rendered":"<p>The eventual creation of botnet(s) based on mobile devices rather than PCs has been theorized about for years, but no such malware has ever appeared in the real world\u2014at least, not until now. Security researchers believe they may have found the first true mobile worm, dubbed &#8220;Sexy View&#8221; or &#8220;Sexy Space&#8221; depending on which version of the program one encounters. The infected payload displays many of the characteristics of PC botnet software and is now more sophisticated than other handheld attacks that have appeared<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The eventual creation of botnet(s) based on mobile devices rather than PCs has been theorized about for years, but no such malware has ever appeared in the real world\u2014at least, not until now. Security researchers believe they may have found the first true mobile worm, dubbed &#8220;Sexy View&#8221; or &#8220;Sexy Space&#8221; depending on which version of the program one encounters. The infected payload displays many of the characteristics of PC botnet software and is now more sophisticated than other handheld attacks that have appeared <a href=\"https:\/\/computerhunter.us\/?p=10019\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-10019","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/posts\/10019","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10019"}],"version-history":[{"count":0,"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/posts\/10019\/revisions"}],"wp:attachment":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10019"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}