- From: Frederick Hirsch via cvs-syncmail <cvsmail@w3.org>
- Date: Thu, 06 Jan 2011 23:39:08 +0000
- To: public-dap-commits@w3.org
Update of /sources/public/2009/dap/policy-reqs In directory hutz:/tmp/cvs-serv16792 Modified Files: Overview.html Log Message: additional update to security/threats section Index: Overview.html =================================================================== RCS file: /sources/public/2009/dap/policy-reqs/Overview.html,v retrieving revision 1.53 retrieving revision 1.54 diff -u -d -r1.53 -r1.54 --- Overview.html 6 Jan 2011 23:35:43 -0000 1.53 +++ Overview.html 6 Jan 2011 23:39:06 -0000 1.54 @@ -365,10 +365,6 @@ <section id="threats" class='appendix'> <h3>Security and Privacy Threats</h3> <p> - This section outlines some threats related to - the Device APIs. - </p> - <p> The landscape that is being created is the enablement of cross-platform, cross-device, easy to develop, highly functional @@ -378,14 +374,14 @@ increasing significance. This section outlines some known threats. </p> <p> - Up until now the measures taken by the mobile industry have - proven highly successful in ensuring no major malware incident - has affected the industry. There have been attempts: the + Up until now no major malware incident + has affected the mobile industry, but risks increase as + adoption and convergence increases. There have been attempts: the MMS-spreading Commwarrior virus is probably the most infamous, along with the Spyware tool, Flexispy. An additional factor in - ensuring the success of mobile security has been the fact that - mobile platforms have been too fragmented and complex, therefore - not representing an attractive target so far. Existing modus + avoiding mobile security issues to date has been the fact that + mobile platforms have been too fragmented and complex + to provide an attractive target. Existing modus operandi from technology-related attacks can provide indicators as to the types of attack and abuse that can be expected on widgets and web applications as device APIs are opened up
Received on Thursday, 6 January 2011 23:39:16 UTC