Mobile Security News archives
5 ways to secure your Blackberry
Filed Under: Mobile Security NewsWednesday, December 17th, 2008
By Joan Goodchild
networkworld.com
It seems we can’t go a day lately without a new story about some security screw-up involving a lost or misplaced Blackberry. This week, officials with John McCain’s campaign mistakenly sold a Blackberry to a Fox television reporter for $20 in a fire sale. The device contained confidential campaign information. And many Hollywood gossip publications were abuzz earlier this month with news that Tom Cruise had lost his Blackberry while promoting a movie in Toronto. (Mixed reports now peg the device as either “found,” or “never lost in the first place.”)
With all of these slip-ups, it’s no wonder White House officials want President-Elect Barack Obama to relinquish his Blackberry before taking office. With this in mind, CSO asked Dan Hoffman, author, mobile security expert and CTO of SMobile Systems, for his advice on ways to keep your Blackberry safe.
Read more tips to protect your BlackBerry…
The G1 & Security: A Paradox in Play?
Filed Under: Mobile Security NewsWednesday, October 22nd, 2008
By Judy Mottl
internetnews.com
The arrival Wednesday of the T-Mobile G1, the first Android smartphone, marks the debut of the most open mobile operating system yet.
Android’s creators – the Open Handset Alliance (OHA), Google and T-Mobile – have pledged to fully support third-party application development, promising no one will dictate what users can download to the G1, or what developers can upload to the Android Market storefront.
Such openness is aimed at advancing mobile applications, fostering innovative services and, of course, becoming the ‘game changer’ in a competitive and crowded smartphone market.
Google (NASDAQ: GOOG), handset maker HTC and T-Mobile have essentially squared off against leading smartphone players, Apple (NASDAQ: AAPL) and Research in Motion (RIM), to grab market share and user adoration.
Read more about Android G1 security…
SMobile ContactCrypt Protects Against Newly Exposed iPhone Security Vulnerability
Filed Under: Mobile Security NewsWednesday, August 27th, 2008
The Gizmodo Gadget Guide website recently published an article describing a very large security vulnerability in the iPhone. Because of this flaw, even passcode-protected devices can reveal sensitive personal information on the iPhone by easily pressing a few buttons. This vulnerability is possible because of two reasons:
- The Emergency Call option can be exploited to expose sensitive information
- Sensitive information on the iPhone is not encrypted.
To access sensitive information, a person stealing or finding an iPhone simply needs to select the Emergency Call option and press the Home Button twice. Doing so takes the user to the Favorites screen, where Contact information is clearly exposed. Because the sensitive Contact information is not encrypted, it can be easily viewed. Various Contact-related fields, such as URL’s, can also be accessed via these contacts to provide access to the Safari browser and to e-mail.
This security flaw highlights a fundamental flaw in the iPhone – lack of encryption. To address this flaw, SMobile Systems has created ContactCrypt. ContactCrypt encrypts the Contact information not only protecting that sensitive information, but also not exposing associated URL’s and e-mail addresses that can provide access to other portions of the device. Below are screenshots showing the Contact database and associated contact URL, e-mail, etc. fields., including Favorites, in an encrypted state by using ContactCrypt.
A short video detailing ContactCrypt functionality can be found here.
Click here for the ContactCrypt user manual. ContactCrypt has been submitted to the Apple App Store.
Cell phone users beware
Filed Under: Mobile Security NewsWednesday, April 30th, 2008
The Kuykendall family is terrified. Someone is hacking into their cell phones.
“They’ve totally taken over her phone,” Mrs. Kuykendall said as she talks about her teenage daughter’s mobile phone.
The stalkers know what the family is doing, what they’re wearing, what they’re saying.
“They threatened to kill us February 20th,” the elder Kuykendall said. “I’m just waiting for someone to wake me up. It’s like a nightmare.”
Authorities thought they were making it up. They told the family it was not possible. No one could do that.
They were wrong. It is possible.
At least a half dozen internet sites sell software that turns mobile phones into spy phones. We found one site out of Thailand. Their top of the line spyware sold for just over $400…
Read more about mobile phone hijacking…
'Winning' SMS is a hoax, Nokia UK warns
Filed Under: Mobile Security NewsMonday, April 28th, 2008
By Sunita Menon, Staff Reporter
gulfnews.com
Dubai: A leading mobile company has warned its users not to respond to a message that tells them they have won thousands of pounds.
A number of Nokia mobile users in the country said they received a message in their inbox that read: “Congratulations! Your cell phone has won £165,000 [Dh1.2 million] in the ongoing Nokia UK promo.”
The message also featured an e-mail address and a telephone number for claims.
Gulf News got in touch with Nokia Corporate Communications in the UK for clarification. The company said the message is one of several hoax sms’s that are circulating around the world, and Nokia has nothing to do with them.
Read more about SMS hoax…
New WinCE trojan discovered - WinCE/InfoJack
Filed Under: Mobile Security NewsWednesday, February 27th, 2008
A new strain of WinsCE Trojan has been reported. The malware was dubbed WinCE/InfoJack, this program was created by an unnamed Chinese site and it is bundled with legitimate installation files distributed by Google Maps.
Once installed, “WinCE/InfoJack” sends the infected device’s serial number, operating system and other information to the author of the Trojan.
WinCE/InfoJack has a number of features that show its malicious intent:
• Installs as a program that runs automatically on the memory card
• Installs itself on the device from the infected memory card
• Allows for silent installation of unsigned applications
• Creates a backup copy of the infected file
SMobile announces solution for latest mobile phone virus
Filed Under: Mobile Security NewsThursday, January 31st, 2008
Computer Technology Review
SMobile Systems announced Monday that it has prepared and tested a mobile anti-virus update and disinfection tool for its Security Shield platform to help protect Nokia smartphones being attacked by a malicious SymbianOS Worm (also referred to as a Beselo worm) currently spreading on mobile phone networks worldwide.
The virus is being disseminated as a multimedia file (MMS) with such monikers as Beauty.jpg, Sex.mp3 or Love.rm. When installed on the handsets, the malware gathers all the phone numbers located in the phone’s contact lists and targets them with a viral MMS carrying a SIS-packed (Symbian Installation Source) version of the worm. In addition to harvesting these numbers, the malware also sends itself to generated numbers. To date the worm only affects Symbian S60 enabled smartphones, including models such as the Nokia 6630, 7610, 6680, and N70. However, with modifications, this current attack could spread to many additional smartphone models…
Read more about SMobile virus solution…
Worm Attacking Nokia Mobiles
Filed Under: Mobile Security NewsMonday, January 21st, 2008
By Sarah Falson
Smarthouse
A worm which latches onto the phonebook stored in a mobile handset and sends virus-laden multi-media messages (MMS) to the owner’s friends has been discovered locally, attaching itself to popular Nokia phones.
Called the SymbianOS Worm, the virus is able to run on Symbian S60-enabled devices which include Nokia 6600, 6630, 6680, 7610, N70 and N72 phones.
Phone-owners who receive an MMS with the file name Beauty.jpg, Sex.mp3 or Love.rm, should delete the file immediately.
Read more about Nokia worm attack…