Mobile & Cell Phone Information

Mobile Devices Security


As this security solution is not such a great idea, other companies have researched, and finally found a new way to prevent cell phones and PDAs theft. This method permits to remotely disable up to four different tasks of a stolen cell phone or PDA, rendering it inoperable. But at the same time data contained in the device are locked. The beauty of this option is that the unit is not damaged in any way - full functionality and data can be easily restored if the device is recovered. Thus, the device is useless to the thief, but it can be reactivated and restored if it is recovered and returned to its rightful owner.

Another new security breach has been encountered this year when reports were received about a backdoor Trojan horse program that can take control over a mobile device. This is the first known backdoor Trojan horse for PDAs. The subject program, identified as Backdoor.Brador.A, attacks PDAs running the Windows operating system. And like all backdoors, it cannot spread by itself. The Trojan arrives as an e-mail attachment or can be downloaded from the Internet. Also, it has a complete set of destructive functions characteristic for backdoors. After it is installed, this small program is activated when the PDA is restarted and begins to look for a remote administrator to take control of the device. Security specialists claim the virus was written by a Russian virus coder since it was attached to an e-mail with a Russian sender address and contained Russian text. Fortunately, the Trojan's threat control and removal was rated as "easy".

The important thing about this virus is not the number of devices affected, because this number is very small, but the fact that this is the first one that appeared on the "market" is considered to be very important. We have to admit that it is hardly surprising that viruses have found their way to mobile devices. This is the natural trend. Where technology goes, viruses will follow. As the new technology shifts into the mobile market, these threats will move in that direction also. The specialists from the Kaspersky Labs claim they were expecting a virus attack on a PDA, due to the latest attacks against other mobile devices. Now, the PDA users look at a real danger and it is a well known fact that interested intruders will grab the chance to attack PDAs and mobile phones in the near future. Virus threats development for mobile devices is passing through the same stages as the one for desktops.

Almost at the same time with the appearance of the first Trojan for PDAs, the first virus to affect cell phones has also arrived. This worm is called "Cabir", and it has been spotted by some security specialists who issued an alert concerning the danger. Cabir spreads using a file named "Caribe.sis" and travels across devices working with the Symbian operating system which is used in PDAs and many cell phones. Cabir places itself usually on a mobile device when a user agrees to a transmission showing the text message "Caribe". After that the worm begins a nonstop search particularly for Bluetooth-connected wireless devices to send itself to. Also, the battery's life of the infected device is harshly reduced during this process. The inventors of Cabir did not design the worm to spread massively. It was intended to be a test demonstrating that these mobile devices can be easily infected by viruses because of their rapid maturation. The worm rated with a low risk because it has to be intentionally activated by a mobile phone user, and also allowing the Caribe package requires pressing a button prior the files can be loaded into the receiving phone.

It was predictable that viruses and worms for cell phones and PDAs would appear. This is the end result of the impressive advances made in mobile communication technology in the past years. Over time, cell phones and PDAs turn out to be more PC-like, making them vulnerable to viruses. And because they are more PC-like, smart cell phones and PDAs are mostly used by companies for mission-critical applications and data storage. Also they are used for receiving emails and text messages just like desktop computers. That makes their users just as exposed to viruses and worms. These security concerns can be dealt with software-encryption solutions that need to be attached to the new devices. The encryption technology expands to mobile devices the identical type of security that many companies have organized into their desktop computers. It encrypts data and prevents illegal access to the data stored within the device, which is either lost or stolen.

Mike Ber is the owner of the Canadian Domain Name Portal called http://www.Every.ca. He is also a contributing author to Canadian Computer Magazine and http://www.Developer.ca website.


MORE RESOURCES:
This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news


The Daily Telescope

Website to Trace Mobile Cell Phone by Satellite GPS Updates Mobile App
The Daily Telescope
Popular website to trace and locate mobile cell phones by satellite GPS has updated its mobile app. This means it gives a much more streamline experience for users to search and locate a cell phone. These new changes make if far easier to operate the ...

and more »


Madison.com

Update: Phone store robbery suspects identified by Madison police
Madison.com
A suspect in an armed robbery of a T-Mobile cell phone store prepares to be apprehended by law enforcement officers at a gas station near Highways N and H south of Madison, Wis., Friday, Jan. 12, 2018. JOHN HART, STATE JOURNAL. JOHN HART, STATE JOURNAL ...

and more »


Fox 59

Thieves smash through Indy church wall to break into cell phone store
Fox 59
Instead, the thieves climbed through the wall to break into a Boost Mobile cell phone business next door. “I don't know how they did it, but they went through the wall,” said Turner. The owner of the Boost store says once the thieves got inside, they ...

and more »


NB Herard

North America Outside Plant Fiber Optic Installation Apparatus Market Forecast 2017-2027; New Report Launched
NB Herard
Service providers that provide landline telephony are considered in the Telecommunications category, even if they also provide Internet, Cable TV, as well as mobile/cell phone service; service providers that offer mobile/cell phone service (only) are ...

and more »


KING5.com

Thieves are stealing your cell phone number to take your money
KING5.com
In less than 15 minutes, a man in Denver lost his cell phone number, and his bank account was hacked into. Author: Marshall Zelinger. Published: 9:46 AM PST December 22, 2017. In less than 15 minutes, my dad had his cell phone number stolen from him ...

and more »


Madison.com

Phone store robbed at gunpoint; Madison police find and arrest suspects
Madison.com
A suspect in an armed robbery of a T-Mobile cell phone store prepares to be apprehended by law enforcement officers at a gas station near Highways N and H south of Madison, Wis., Friday, Jan. 12, 2018. JOHN HART, STATE JOURNAL. JOHN HART, STATE JOURNAL ...

and more »


TVOvermind

10 Things You Didn't Know about “Wall Street”
TVOvermind
... the entire experience it was resounding call to arms or something to be ignored since obviously movies don't always depict reality. Whether they do or not however this film was something that made people stand up and pay attention as they witnessed ...



WND.com

Study: Constantly taking selfies is sign of mental disorder
WND.com
So glad I have never had a mobile / cell phone. This vanity is another example of why. .....To see what this obsession is doing to our society, watch this ; http://www.renegadetribune.... Ngorgh • 2 days ago. EL SHADDAI {ALMIGHTY GOD} sure doesn't like ...

and more »


89.3 KPCC

DACA job permits will begin expiring soon
89.3 KPCC
DACA recipient Peter Isais fired up his weathered Honda Civic on a recent afternoon and headed out to his job as a mobile cell phone repairman. "I have like three repairs today — the first one's going to be in Irvine," said Isais, 34, as he motored ...

and more »


WXIA-TV

Controversial T-Mobile cell phone tower back on Roswell's agenda
WXIA-TV
Controversial T-Mobile cell phone tower back on Roswell's agenda. ROSWELL, Ga – The city council is once again set to consider whether to allow a controversial T-Mobile cell phone tower to be built in a residential neighborhood. Author: Christopher ...


Google News

home | site map
© 2006