Mobile Devices Security

As this security solution is not such a great idea, other companies have researched, and finally found a new way to prevent cell phones and PDAs theft. This method permits to remotely disable up to four different tasks of a stolen cell phone or PDA, rendering it inoperable. But at the same time data contained in the device are locked. The beauty of this option is that the unit is not damaged in any way - full functionality and data can be easily restored if the device is recovered. Thus, the device is useless to the thief, but it can be reactivated and restored if it is recovered and returned to its rightful owner.

Another new security breach has been encountered this year when reports were received about a backdoor Trojan horse program that can take control over a mobile device. This is the first known backdoor Trojan horse for PDAs. The subject program, identified as Backdoor.Brador.A, attacks PDAs running the Windows operating system. And like all backdoors, it cannot spread by itself. The Trojan arrives as an e-mail attachment or can be downloaded from the Internet. Also, it has a complete set of destructive functions characteristic for backdoors. After it is installed, this small program is activated when the PDA is restarted and begins to look for a remote administrator to take control of the device. Security specialists claim the virus was written by a Russian virus coder since it was attached to an e-mail with a Russian sender address and contained Russian text. Fortunately, the Trojan's threat control and removal was rated as "easy".

The important thing about this virus is not the number of devices affected, because this number is very small, but the fact that this is the first one that appeared on the "market" is considered to be very important. We have to admit that it is hardly surprising that viruses have found their way to mobile devices. This is the natural trend. Where technology goes, viruses will follow. As the new technology shifts into the mobile market, these threats will move in that direction also. The specialists from the Kaspersky Labs claim they were expecting a virus attack on a PDA, due to the latest attacks against other mobile devices. Now, the PDA users look at a real danger and it is a well known fact that interested intruders will grab the chance to attack PDAs and mobile phones in the near future. Virus threats development for mobile devices is passing through the same stages as the one for desktops.

Almost at the same time with the appearance of the first Trojan for PDAs, the first virus to affect cell phones has also arrived. This worm is called "Cabir", and it has been spotted by some security specialists who issued an alert concerning the danger. Cabir spreads using a file named "Caribe.sis" and travels across devices working with the Symbian operating system which is used in PDAs and many cell phones. Cabir places itself usually on a mobile device when a user agrees to a transmission showing the text message "Caribe". After that the worm begins a nonstop search particularly for Bluetooth-connected wireless devices to send itself to. Also, the battery's life of the infected device is harshly reduced during this process. The inventors of Cabir did not design the worm to spread massively. It was intended to be a test demonstrating that these mobile devices can be easily infected by viruses because of their rapid maturation. The worm rated with a low risk because it has to be intentionally activated by a mobile phone user, and also allowing the Caribe package requires pressing a button prior the files can be loaded into the receiving phone.

It was predictable that viruses and worms for cell phones and PDAs would appear. This is the end result of the impressive advances made in mobile communication technology in the past years. Over time, cell phones and PDAs turn out to be more PC-like, making them vulnerable to viruses. And because they are more PC-like, smart cell phones and PDAs are mostly used by companies for mission-critical applications and data storage. Also they are used for receiving emails and text messages just like desktop computers. That makes their users just as exposed to viruses and worms. These security concerns can be dealt with software-encryption solutions that need to be attached to the new devices. The encryption technology expands to mobile devices the identical type of security that many companies have organized into their desktop computers. It encrypts data and prevents illegal access to the data stored within the device, which is either lost or stolen.

Mike Ber is the owner of the Canadian Domain Name Portal called http://www.Every.ca. He is also a contributing author to Canadian Computer Magazine and http://www.Developer.ca website.

In The News:


pen paper and inkwell


cat break through


Cellular Phones ? Things to Consider When Buying a Phone

Staying connected with a cell phone has become a way... Read More

International Calling Made Simpler And Cheaper

When people make international calls from their cell phones or... Read More

Latin Ringtones Mean Dinero for Ringtone Providers

Until recently, when you thought of ringtones, you usually thought... Read More

Buying a New Business Phone System

Buying a new business phone system is one of the... Read More

Camera Cell Phones - Say It With Pictures!

Camera cell phones are sweeping the nation! In fact, long... Read More

Here Are Some Tips For Safe and Appropriate Use of Your Mobile Phones

Bought the latest in mobile phones? Can't wait to show... Read More

The Cell Phone Store

Effectively everybody wants the hottest and best cheap cell phones... Read More

Best Cell Phones - Cell Phone Shopping 101

Before the advent of cell phones, communications may not have... Read More

Why Your Business Should Consider SMS

As an organisation, the use of SMS might seem too... Read More

Camera Cell Digital Phone

Camera cell digital phone - description.Camera cell digital phone is... Read More

Cell Phones Revealed

The cellphone is truly a marvelous invention. It has had... Read More

Telephone Tips, Techniques and Etiquette

Whether using the telephone for business or personal use, using... Read More

Americans Catching on to Wireless Text Messaging

Once considered a teenage fad, text messaging popularity in the... Read More

Donate Your Old Cellular Phone To Support A Worthy Cause

With new features being added to cellular phones at an... Read More

Free Cell Phones All Around - Cashing in on Consumerism

There's no greater way to win the hearts of consumers... Read More

Smartphones - Beyond Voice to Information and Entertainment

Investments in shares of wireless technology companies and wireless service... Read More

Teens And Cell Phones

Let the battle begin, should teens have cell phones? Well... Read More

Best Camera Cell Phone

Best camera cell phone - description.Best camera cell phone is... Read More

Sorting Through Your Cellular Phone Options

Some people purchase a cellular phone for emergency use only,... Read More

The Teen Cellular Phone Market is Growing in Leaps and Bounds

Everywhere you turn around, you see someone talking on a... Read More

Say Goodbye to Traditional Telephone Lines

Like old, dusty books on the shelves of public libraries,... Read More

Safer Cell Phone Use For Drivers

Cell phones are great for people on-the-go, but talking on... Read More

Cell phone Etiquette. The Do?s and Don?ts

With more and more people buying cell phones, it becomes... Read More

Have Some Fun With Cell Phone Games

You're never too old to have some fun. With the... Read More

Cheap Long Distance or is It Really? The Search Continues...

Each month, there are countless Americans who are faced with... Read More

Indian Mobile Infrastructure - To 3G or Not To 3G

To most overseas investors circa 1994, a first look at... Read More

Making Sense of Cellular Phone Minutes

Cellular phones are different from your land-line home phone in... Read More

Bill Payment & Cellular Services - The Wave Of The Future For Merchant Retailers!

Electronic DistributionHow Electronic Distribution WorksThe Problems of Distributing Prepaid Services... Read More

Makes Cell Phones Ring at Airports

International Terrorist and insurgents to detonate bombs to kill innocent... Read More

Selecting a Cell Phone

More Than Just a PhoneSelecting a cell phone is no... Read More

Protect Yourself From Cell Phone Radiation

With cell phones quickly becoming an important part of our... Read More

Camera Cell Phone Verizon

Camera cell phone by Verizon ? offer with a service... Read More

Cell Phone Reviews ? Why Do Them?

Well let's be honest some people just don't bother doing... Read More