Mobile Phone Security Threats

The larger goal of mobile phone hackers
In this sense, it is a big long, but here too .... Worrying.

During the last decade, for example, weakens the PC for more than a manager, viruses, worms and Trojans who now means that the mobile phone. For a number of experts who understand that their PC predecessors, so that some fear could be the worst of the whole party with the information below. Rather it is the planet now the distance between the two slow, PC, rather than a mobile phone more compact growing. Second, many of the mobile customers to pay for goods and services for use in electronic equipment such as leather bags in their planning. And 3rd, new applications for mobile phone manufacturers more often in control of the public Internet connection secure operating platforms, once carried out by third parties.

Millions (and some day billions) of banking functions, such as an elegant, open interface, and Internet capabilities on mobile phones - all of hockey and PC, in order to be collective develop their skills of hackers, here is the easy to understand why it ended in the last decade, is now setting up the mobile devices for their headlines.

Eminence, but there is no fun or money, PC world has continued to grow as well, the main purpose of mobile viruses is to write, Andreas Lamm, manager of an anti-virus company Kaspersky Labs said.

As a result, some mobile phone as an attack (about 10) and the middle is good for that primarily, the target of hackers, but not exclusively, for example, Microsoft Windows Mobile or Symbian OS running on a Nokia Series 60 interfaces that use an open platform, the new smart phone. There is, in other words, viruses, worms and Trojans, the ability of the entire environment - Smartphones such as relationships, play down or Bluetooth wireless networking with email functions, lots of them.


Kaspersky Labs was the first mobile phone worm can spread is found to be more efficient. Symbian OS devices to run a distance of 10 meters on the Cabir Bluetooth to copy itself using the concept of proof-of-infection. It is a Symbian Installation System (SIS) file disguised pass and Caribe, a security facility. When an infected file is launched, the mobile phone's screen has the word "Caribe" and shows that Cabir is started each time the phone turned on so the worm modifies the Symbian OS. The worm sends an infected phone; the phone is weak on the 1.

Another one of the smartphones Trojan game of the same name, Mosquito, was attacked. Once installed, the user's knowledge, approval numbers in several countries, a premium-rate SMS text messages mobile viruses, Trojans, back to back and struck two. First, Skulls.A, images of the skull icon from the menu instead of icons, such as email and calendars to Symbian system applications, disable all the links. Users can send or receive telephone calls from the affected.

The recent tension Skulls.B, Cabir.B worm and, unlike most of the scalp included. A, Bluetooth's range can spread to the other phone. Alternatively, the skeletons of jigsaw puzzle pieces to make frivolous applications Skulls.B is Symbian default icons, use, otherwise it is equal to its predecessor.

And with increased frequency of - a few of these viruses, even though he was going to be afraid of what the mobile phone industry.

"We are not panicking; viruses to spread out there are not enough platforms simply are not there; we still need one point," Steve Babbage, security director at Vodafone, said. "But we cannot protect us for long."

Vodafone, Britain (and Europe), the leading mobile operator, because of concerns that it has. These are a high speed 3G service are now offered in one of the smart phone users. Vodafone and many other British and European operators in the 3G licenses for over-the-money prices. They want to undermine the fact that capital is the only group of viruses.

Business customers will also be concerned about mobile viruses from Paranoid sorry.

"We are now starting to see some mobile viruses, and anti-virus software providers in this rapidly publicized as extravagant," more than 200,000 employees worldwide, the company's blue chip IT security director, said that European consumer goods. "There is the nature of our company, see ya in a bit more, but get hit with any virus that may change rapidly. Then, of course, here it was too late."

Led by the phone manufacturer Nokia, the third party developers to open their platforms and applications for the new smart phone in a couple of years ago and decided to encourage the development of mobile viruses, the door is opened. Determination of PC applications that require expertise in training developers, mobile data beyond the industry's push was prompted to clean the phone.

"We have chosen to create the third-party applications for users more interested in publicity," Guidance for developers and design of architecture and API have access to the libraries of the Eero Kukko, Nokia Technology Marketing Manager, said on the stage. "At the same time, we have to protect the security of software development is made up of these applications; developers can."

Anti-virus companies to move and applaud.

"We are happy to be driven by the conversion of cell phone providers to their platforms," ​​Matias Impivaara, F - Secure Mobile Security services in the business manager, said. "Users can have the benefits of open platforms with the problems they face up to the security side is larger than most. Security, we do not only affect the system."

Anti-virus software before you asked that the company was peddling, but Impivaara has a point: no one really to abandon their new mobile data services and voice only wants to return because of the security implications.

Mobile phone manufacturers and operators to open the door to the global Internet, but he has suffered more than a closed proprietary system for security to have a more robust security.

This activity is a good way for better security.

At the level of the client software, to occur, anti-virus subscription service, Nokia, F - Secure and Symantec Agreement deals with the speed of responding to the attacks of its new smart phone.

Nokia 6670, F-Secure anti-virus updates for a monthly fee with an automatic over-the-air programs that are similar to PC protection - equipment maintenance, and provides.

Symantec, Nokia 9500 Communicator and 9300 smartphone runs Symbian, has presented his client's security software. NTT DoCoMo Network Associates, anticipating problems, McAfee anti-virus software from the product manufacturer, signed an agreement last year.

Hardware level, the Security Forum of Britain's ARM Holdings to market on ARM's core processor technology, the power of a good number of mobile phones and handheld computers to the new standards emerge, as TrustZone. The latest generation of Intel XScale chips from Texas Instruments after the introduction of hardware-based security, is constructing the next generation of mobile chips TrustZone.

Palladium is the leading mobile chip makers in earlier times, PC World; Microsoft was not a code base for the generation of secure hardware-based security to introduce the project. Programs, Intel, Texas Instruments and a protected part of memory, ARM call for emphasis - after reviewing the applications that can be safely out of - the rest is divided into the processor.

Fundamental level, managers can monitor and filter the spam from a corrupt download and install a wide range of tools that have been made. Viewed at the web gateway to the modern messaging and content delivery servers, are at the edge of their networks. Other new virus detection and repair technology was deployed deeper into communication.

Users can access these new systems are already required to identify themselves via their mobile phone SIM card mobile phone authentication and control systems in place to come on.

"these are spam and viruses at the edge of the network to protect the front door to the real key here," Mobile software and technology to provide a message to David Staas, Open Wave Systems, director of an anti-virus team said. "But some will still be charging. The second line of defense is required here and there."

Open wave, he was eliminated, but errors that prevent the abuse of the attack, for example; a message from the network spyamargalu Vermont has developed a new system.

Nokia's infrastructure arm, beyond the basic firewall system provides operators with a range of security equipment. The Message Protection Server, for example, filters out potentially harmful e-mail, as well as its Operator Delivery Server inspects all downloaded. Finnish manufacturer of mobile VPN client and web-based applications, along with additional security provided by SSL encryption.

The prime source of viruses - downloads two new certification programs for quality assurance and trustworthiness of the application.

Java Verified program is Java-based applications for mobile phone testing and certification process to provide a unified, Motorola, Nokia, Siemens, Sony Ericsson and Sun to several suppliers, before the release of this year. Plan adopted by Orange and T-Mobile.

Test and a certificate to sign Symbian Symbian is a program that provides a service-based application. Nokia, Sendo and Sony Ericsson include a new, reliable use of the thriving market to ensure, among other things aim.

To do so, the Trusted Computing Group consolidated a number of organizations, including the Open Mobile Alliance and the European Telecommunications Standards Institute for mobile devices, security systems, the quality to the development.

It remains to be seen how the potential of these efforts. Cooperation is essential and should only be used as tools by a user.

"He could set preferences ought, to do so on their block list, for example," Staas said. "He was, more moderate and less control, their sensitivity at the level of spam; it is possible to say."

For another, managers are away from their network to overthrow threatening or abusive spam to consumers should not wait for the virus.

"A lot of businesses and consumers to the largest mobile operators received a call from the chief executive of a chief executive for its customers," Staas said. "The night before, he received a message from the business customer 2am. His wife when she got up to go, what to read so it is urgent to consider an explicit text. He was furious.

"Mobile phone executive turned around the very next day, said that security is a top preference for their team."

Sometimes, a little spam to go to reach.

Twitter Delicious Facebook Digg Stumbleupon Favorites More