Language:
Mobile News
renew your license


News and Information -
Stay Informed!

Subscribe to the SMobile Mobile Security Newsletter to receive the latest virus news, updates and security information.

Click Here to Subscribe!

SMobile ContactCrypt Protects Against Newly Exposed iPhone Security Vulnerability

August 27, 2008

The Gizmodo Gadget Guide website recently published an article describing a very large security vulnerability in the iPhone.  Because of this flaw, even passcode-protected devices can reveal sensitive personal information on the iPhone by easily pressing a few buttons.  This vulnerability is possible because of two reasons:

  1. The Emergency Call option can be exploited to expose sensitive information
  2. Sensitive information on the iPhone is not encrypted.

To access sensitive information, a person stealing or finding an iPhone simply needs to select the Emergency Call option and press the Home Button twice.  Doing so takes the user to the Favorites screen, where Contact information is clearly exposed.  Because the sensitive Contact information is not encrypted, it can be easily viewed.  Various Contact-related fields, such as URL’s, can also be accessed via these contacts to provide access to the Safari browser and to e-mail.

This security flaw highlights a fundamental flaw in the iPhone – lack of encryption.  To address this flaw, SMobile Systems has created ContactCrypt.  ContactCrypt encrypts the Contact information not only protecting that sensitive information, but also not exposing associated URL's and e-mail addresses that can provide access to other portions of the device.  Below are screenshots showing the Contact database and associated contact URL, e-mail, etc. fields., including Favorites, in an encrypted state by using ContactCrypt. 

A short video detailing ContactCrypt functionality can be found here.

Click here for the ContactCrypt user manual.  ContactCrypt has been submitted to the Apple App Store.



On-device defences for mobile malware

By Lisa Phifer
August 25, 2008
SearchSecurity

As workforces grow increasingly dependent on smartphones, mobile threats warrant serious consideration. At precisely the time when mobile users are becoming a bigger, juicier target. When the mobile malware "tipping point" is reached, will your organisation be ready?

Mobilising your malware defenses

Conventional Win32 malware defenses are commonly deployed on the assets they protect: PCs. Antivirus scanners, host intrusion detection programs, personal firewalls, and email spam filters are all designed to stop viruses, worms, trojans and spyware that prey upon desktops and laptops. These "on device" defenses are generally accepted security best practices, widely used by both businesses and individuals.

Early mobile malware defenses started down this familiar path. Antivirus scanners emerged for PDAs well before Symbian Cabir grabbed headlines back in 2004. But some of those products were just too early and were discontinued before mobiles were widely used, when "proof of concept" malware lacked the teeth to pose real risk.

Today, mobile antivirus scanners are experiencing a market rebound, stimulated by smartphone sales -- especially to businesses. Mobile antivirus products are now available from popular Win32 antivirus vendors (e.g., F-Secure, McAfee, Symantec, Trend Micro, Sophos) and "mobile specialists" like SMobile and Airscanner. Mobile antivirus scanners are even available for iPhone and BlackBerry handhelds.

 

more>>



Hackers on the Move

By ROGER CHENG
August 11, 2008
The Wall Street Journal

More small companies are allowing employees to use their personal smart phones for work. But that move could lead to big trouble, thanks to a new breed of hackers who are starting to target mobile phones.

Hackers can use spyware to keep an eye on what you type and what messages you receive, possibly gleaning company secrets. They can even can track your device's location, potentially allowing them to figure out your clients or plans by looking at where you go...

 

more>>



SMobile Global Threat Center Creates Proof of Concept Exploit.

By Dan Hoffman
August 5, 2008

The SMobile Global Threat Center has created a very important and revolutionary proof of concept exploit. This Symbian-based exploit installs as a trojan during the installation of a Racer-3D racing game. Unbeknownst to the end-user, a keylogger begins capturing all keys typed into the device and forwarding them to a server at regular intervals. This includes typed URL's, usernames, passwords, messages, etc. A hacker can go to the server, review the keys typed and use the recorded URL's, usernames and passwords to log into various accounts, including mobile banking, VPN, etc, and view the contents of messages. To add to the reality of the exploit, it even goes so far as having a POC mobile banking website where those stolen credentials can be entered and used to transfer money between accounts. This is a very important POC, because it is a keylogger, runs silently, is installed as a Trojan and would cause devastation to consumers, banks and enterprises. In essence, this is one of the most powerful pieces of malware that can be created.


Click Here to View the Video


Sybase iAnywhere bolsters mobile device security

By John Cox
Network World
July 2, 2008

Sybase iAnywhere is beefing up its Afaria mobile-device management software by adding antivirus and firewalling capabilities.

One of several applications that make up the company's Information Anywhere Suite, Afaria lets enterprise IT administer a range of task around device security and management, such as authentication, encryption, and remote device “kill” if its stolen or lost. The company, a subsidiary of Sybase, Inc., now is incorporating software from SMobile Systems to run virus scans on the device and to handle two-way IP packet filtering and inspection.

The changes are two new optional programs, Afaria Antivirus Manager and Afaria Firewall Manager, that add significant new protections for the growing number of enterprise handhelds...

more>>


Are smartphone viruses really a threat to your network?
As iPhones, other devices grow in popularity, so will risky Web browsing

By John Cox
Network World
June 23, 2008

All evidence points to the fact that smartphone viruses will be a threat to your network even though they aren't at this moment. After all, the latest mobile devices are packed with more and more applications and corporate data, are enabled for real Web browsing and online collaboration, and can access corporate servers. What's more, they live outside your firewall and often make use of three wireless networks (Bluetooth, Wi-Fi and cellular).

"It's definitely something I worry about a lot," says Sam Lamonica, CIO of Rulph and Sletten, a Redwood City, Calif., general contractor. "With the proliferation of smartphones throughout our business, it poses a great risk if and when hackers get good at pumping malware through those devices."

more>>


Viruses... on cell phones

By Kara Rowland
The Washington Times
May 29, 2008

This isn't something I've heard very much about, though it isn't very hard to make the jump. Cell phones are increasingly taking on the attributes of personal computers, which we all know are constantly prone to threats of worms, viruses, spam and the like. In particular, smartphones that use operating systems powered by Windows Mobile, Symbian, Linux, Palm or Research in Motion require protection, according to Columbus, OH-based SMobile Systems.

The company, which markets security products tailored to mobile devices, says there are hundreds, maybe even more than 1,000, known mobile viruses...

more>>


Cell phone users beware

www.wkyc.com
April 30, 2008

The Kuykendall family is terrified. Someone is hacking into their cell phones.

"They've totally taken over her phone," Mrs. Kuykendall said as she talks about her teenage daughter's mobile phone.

The stalkers know what the family is doing, what they're wearing, what they're saying.

"They threatened to kill us February 20th," the elder Kuykendall said. "I'm just waiting for someone to wake me up. It's like a nightmare."

Authorities thought they were making it up. They told the family it was not possible. No one could do that.

They were wrong. It is possible.

At least a half dozen internet sites sell software that turns mobile phones into spy phones. We found one site out of Thailand. Their top of the line spyware sold for just over $400...

more>>


'Winning' SMS is a hoax, Nokia UK warns

By Sunita Menon, Staff Reporter
gulfnews.com
April 28, 2008

Dubai: A leading mobile company has warned its users not to respond to a message that tells them they have won thousands of pounds.

A number of Nokia mobile users in the country said they received a message in their inbox that read: "Congratulations! Your cell phone has won £165,000 [Dh1.2 million] in the ongoing Nokia UK promo."

The message also featured an e-mail address and a telephone number for claims.

Gulf News got in touch with Nokia Corporate Communications in the UK for clarification. The company said the message is one of several hoax sms's that are circulating around the world, and Nokia has nothing to do with them.

more>>


New WinCE trojan discovered - WinCE/InfoJack

February 27, 2008

A new strain of WinsCE Trojan has been reported. The malware was dubbed WinCE/InfoJack, this program was created by an unnamed Chinese site and it is bundled with legitimate installation files distributed by Google Maps.

Once installed, "WinCE/InfoJack" sends the infected device's serial number, operating system and other information to the author of the Trojan.

WinCE/InfoJack has a number of features that show its malicious intent:
• Installs as a program that runs automatically on the memory card
• Installs itself on the device from the infected memory card
• Allows for silent installation of unsigned applications
• Creates a backup copy of the infected file


SMobile announces solution for latest mobile phone virus

Computer Technology Review
January 31, 2008

SMobile Systems announced Monday that it has prepared and tested a mobile anti-virus update and disinfection tool for its Security Shield platform to help protect Nokia smartphones being attacked by a malicious SymbianOS Worm (also referred to as a Beselo worm) currently spreading on mobile phone networks worldwide.

The virus is being disseminated as a multimedia file (MMS) with such monikers as Beauty.jpg, Sex.mp3 or Love.rm. When installed on the handsets, the malware gathers all the phone numbers located in the phone's contact lists and targets them with a viral MMS carrying a SIS-packed (Symbian Installation Source) version of the worm. In addition to harvesting these numbers, the malware also sends itself to generated numbers. To date the worm only affects Symbian S60 enabled smartphones, including models such as the Nokia 6630, 7610, 6680, and N70. However, with modifications, this current attack could spread to many additional smartphone models...

more>>


Worm Attacking Nokia Mobiles

By Sarah Falson
Smarthouse
January 21, 2008

A worm which latches onto the phonebook stored in a mobile handset and sends virus-laden multi-media messages (MMS) to the owner’s friends has been discovered locally, attaching itself to popular Nokia phones.

Called the SymbianOS Worm, the virus is able to run on Symbian S60-enabled devices which include Nokia 6600, 6630, 6680, 7610, N70 and N72 phones.

Phone-owners who receive an MMS with the file name Beauty.jpg, Sex.mp3 or Love.rm, should delete the file immediately.

more>>


Mobile viruses are growing in numbers, but there's no return now with intriguing platforms such as Mac OS X and Android aiming for the masses.

By Sindre Lia
InfoSync
November 8, 2007

Specializing in security solutions for mobile phones, SMobile Systems claims to have identified more than 400 mobile viruses to date. With the recent introduction of Internet friendly mobile platforms such as Apple's Mac OS X and Google's Android, it's likely to believe that mobile viruses will explode in the future.

"No longer are these viruses merely nuisances. These viruses are getting more insidious in nature, smarter in their design, and ultimately more dangerous to consumers, corporate smartphone users and to the carriers who provide service", says CTO of SMobile, George Tuvell...

more>>


Bluetooth devices easily hacked

24.com
October 23, 2007

Cape Town - Bluetooth-enabled devices are vulnerable to unscrupulous hackers, an expert warns.
Bluetooth was invented to connect devices such as cellphones, laptops, PCs, printers, digital cameras and video game consoles over a short-range radio frequency, but like any computer network, using Bluetooth can leave you vulnerable.

"Bluetooth hacking techniques vary tremendously. There are various attacks that have proved to be very effective over the last few years. Some of these attacks include making unauthorised calls and transactions, reading and sending SMSs on a target phone, erasing information and downloading personal information such as phone books and access codes," says ICT security expert Dino Covotsos...

more>>


Application of the Week -- SMobile Security Shield

www.s60.com
October 9, 2007

SMobile Security Shield protects your S60 3rd Edition device from unwanted intrusion coming from any direction, including the Internet, short message service (SMS), multimedia messaging service (MMS), e-mail, and direct downloads. It has three different components to accomplish that mission: VirusGuard, to scan for malware, Point Guard, to provide call and message filtering, and the SMobile Firewall, to provide filtering and blocking on a wide variety of media...

more>>


Supplying Smart Phone Armor
By Martha McKay
NorthJersey.com
September 27, 2007

If you believe Rick Roscitt, some very bad stuff might happen to your smart phone.

In the same way viruses attack computers, malicious software can travel across unprotected wireless networks and worm its way into the mobile gadgets we depend on, Roscitt says.

"Nobody would go out and spend $1,800 on a laptop and not put security software on it," he said. "Well, these devices don't have anything," he said pointing to an array of smart phones on a conference table in his Fort Lee office.

Roscitt is chairman and CEO of SMobile Systems Inc., an Ohio-based company that sells software designed to keep those gadgets safe from viruses and hackers...

more>>


SMobile Systems and Symbian OS

"SMobile creates security applications for Symbian OS devices and has developed a comprehensive product suite that protects mobile device users from viruses, the effects of device theft, and unauthorized data access. Forum Nokia PRO has helped SMobile compete effectively in the global mobile security market by facilitating introductions worldwide through PRO matchmaking events."

-Nokia
Download the PDF

Recent Articles
arrow News Focus: Your handphone will tell on you - August 2007
arrow Mobile viruses evolving beyond just 'nuisance' - August 2007
arrow Nokia's Net More Than Doubles On Strong Sales, Bigger Market Share - August 2007
arrow iPhone Flaw Lets Hackers Take Over, Security Firm Says - July 23
arrow Cell phone users urged to install anti-virus software - July 2007
arrow Arrest over phone virus - June 2007
arrow New mobile security threats emerge - June 2007
arrow SMobile Snags Customer in Germany - May 2007
arrow SMobile Offers Security for Wireless Networks - May 2007
Cyber-criminals target mobile banking - January 2007
Rising Threat to Smart Phone Security - January 2007
As cellphone uses grow, so do security options - December 2006
Criminals And Hackers Take Aim At Smartphones - November 2006
Windows CE is extremely vulnerable, says Kaspersky - October 2006
Avanquest UK To Launch Virusguard From Smobile - October 2006
New Mobile Threats Make it Crucial for Operators to Protect Customers - October 2006
Mobile Malware Evolution: An Overview, Part 1- September 2006
Blackberry a Juicy Hacker Target - August 2006
Vishing Joins Phishing as Security Threat - July 2006
Text Messaging Used as Malware Lure - June 2006
Cell-shock: Hackers call up - May 2006
Know how to fry your mobile viruses? - May 2006
Major mobile virus attack 'imminent' - April 2006
Mobile Devices and Users: Keep mobile working safe, secure and under control - April 2006
Bluetooth trojan leaves mobile users out of pocket - April 2006
   

Archived Articles
January 2006
Malware spreads via Bluetooth
...research into the awareness of mobile malware
EBay users hit by mass phishing attacks
 
September 2005
New mobile-phone virus is now in the wild
 
June 2005

Locals Hit By Mobile Virus That Sends Lewd Messages

 
May 2005
Mobile phone operator Orange has announced a plan to roll out email monitoring across 14,000 workstations
 
2004
Site of the Week: Viruslist.com
In the Trenches with Antivirus Guru Mikko Hypponen
Small businesses blissfully unaware of latest threats
Leader: Don't blame your staff - train them
Trojan horse drives spam into cell phones
Skulls Trojan attacks Symbian phones
Arresting an Airborne Virus
Locals Hit By Mobile Virus That Sends Lewd Messages
 
December 2005
Mobile phone and PDA users should expect a rising tide of malicious software
Finland: Mobile phone virus protection to increase
 
August 2005
Neeon digital audio player shipped with the W32.Wullik.B@mm worm...
 

Privacy Policy Ι Solutions Ι News Ι About Us Ι Sitemap

©2006 SMobile Systems
2020 Leonard Ave. • Columbus, Ohio 43219 • 1-866-323-0480