As this security solution is not such a great idea, other companies have researched, and finally found a new way to prevent cell phones and PDAs theft. This method permits to remotely disable up to four different tasks of a stolen cell phone or PDA, rendering it inoperable. But at the same time data contained in the device are locked. The beauty of this option is that the unit is not damaged in any way - full functionality and data can be easily restored if the device is recovered. Thus, the device is useless to the thief, but it can be reactivated and restored if it is recovered and returned to its rightful owner.
Another new security breach has been encountered this year when reports were received about a backdoor Trojan horse program that can take control over a mobile device. This is the first known backdoor Trojan horse for PDAs. The subject program, identified as Backdoor.Brador.A, attacks PDAs running the Windows operating system. And like all backdoors, it cannot spread by itself. The Trojan arrives as an e-mail attachment or can be downloaded from the Internet. Also, it has a complete set of destructive functions characteristic for backdoors. After it is installed, this small program is activated when the PDA is restarted and begins to look for a remote administrator to take control of the device. Security specialists claim the virus was written by a Russian virus coder since it was attached to an e-mail with a Russian sender address and contained Russian text. Fortunately, the Trojan's threat control and removal was rated as "easy".
The important thing about this virus is not the number of devices affected, because this number is very small, but the fact that this is the first one that appeared on the "market" is considered to be very important. We have to admit that it is hardly surprising that viruses have found their way to mobile devices. This is the natural trend. Where technology goes, viruses will follow. As the new technology shifts into the mobile market, these threats will move in that direction also. The specialists from the Kaspersky Labs claim they were expecting a virus attack on a PDA, due to the latest attacks against other mobile devices. Now, the PDA users look at a real danger and it is a well known fact that interested intruders will grab the chance to attack PDAs and mobile phones in the near future. Virus threats development for mobile devices is passing through the same stages as the one for desktops.
Almost at the same time with the appearance of the first Trojan for PDAs, the first virus to affect cell phones has also arrived. This worm is called "Cabir", and it has been spotted by some security specialists who issued an alert concerning the danger. Cabir spreads using a file named "Caribe.sis" and travels across devices working with the Symbian operating system which is used in PDAs and many cell phones. Cabir places itself usually on a mobile device when a user agrees to a transmission showing the text message "Caribe". After that the worm begins a nonstop search particularly for Bluetooth-connected wireless devices to send itself to. Also, the battery's life of the infected device is harshly reduced during this process. The inventors of Cabir did not design the worm to spread massively. It was intended to be a test demonstrating that these mobile devices can be easily infected by viruses because of their rapid maturation. The worm rated with a low risk because it has to be intentionally activated by a mobile phone user, and also allowing the Caribe package requires pressing a button prior the files can be loaded into the receiving phone.
It was predictable that viruses and worms for cell phones and PDAs would appear. This is the end result of the impressive advances made in mobile communication technology in the past years. Over time, cell phones and PDAs turn out to be more PC-like, making them vulnerable to viruses. And because they are more PC-like, smart cell phones and PDAs are mostly used by companies for mission-critical applications and data storage. Also they are used for receiving emails and text messages just like desktop computers. That makes their users just as exposed to viruses and worms. These security concerns can be dealt with software-encryption solutions that need to be attached to the new devices. The encryption technology expands to mobile devices the identical type of security that many companies have organized into their desktop computers. It encrypts data and prevents illegal access to the data stored within the device, which is either lost or stolen.
Mike Ber is the owner of the Canadian Domain Name Portal called http://www.Every.ca. He is also a contributing author to Canadian Computer Magazine and http://www.Developer.ca website.
![]() |
|
![]() |
|
![]() |
|
![]() |
Camera cell phone by Verizon ? offer with a service... Read More
Every day, there are more new uses for the classic... Read More
The AARP, American Association of Retired Persons, ( ... Read More
It's a sad commentary on the way of the world... Read More
Like old, dusty books on the shelves of public libraries,... Read More
Just about every leading mobile phone provider now offers some... Read More
Smart phones are a combination of a cell phone and... Read More
There are a lot of benefits that are offered by... Read More
A recent survey of the FCC's antenna structure registration database... Read More
Looking for a way to save your enterprise or government... Read More
Mobile commerce is electronic commerce over wireless devices. Mobile commerce... Read More
Cell phone safety is a topic widely debated around the... Read More
Most Americans have cell phone plans with contracts that call... Read More
What is SMS?SMS, also known as short messaging service, is... Read More
Analogue is the process of taking an audio or video... Read More
Okay, so we all know that you can change the... Read More
Motorola cellular phone ? description.Motorola has a great selection of... Read More
The telephone is an extremely important piece of equipment and... Read More
First, there was the standard land line phone system; then... Read More
Best camera cell phone - description.Best camera cell phone is... Read More
How many times have you heard of people spending hundreds... Read More
It's no surprise If you've become interested in the new... Read More
Mobile Phones May Be The Next Target... Read More
It's hard to imagine what the world did before the... Read More
Electronic DistributionHow Electronic Distribution WorksThe Problems of Distributing Prepaid Services... Read More
This is basically a system to locate the handheld when... Read More
The internet can be a great place to buy your... Read More
If your child uses a cell phone, take note. A... Read More
Bought the latest in mobile phones? Can't wait to show... Read More
You probably don't even think about it but do you... Read More
Cordless phone systems offer many features and are ideal for... Read More
The newest techno gadget, which is reshaping the way teenagers... Read More
The best money saving practice for buying new cellular phones... Read More
We have become a society that demands the most technologically... Read More
Cellular phone accessory list.There is a wide variety of products... Read More
Well let's be honest some people just don't bother doing... Read More
It's no surprise If you've become interested in the new... Read More
Let the battle begin, should teens have cell phones? Well... Read More
I was shopping in the large superstore with my five-year-old... Read More
Phone and voice mail systems can be pretty costly, even... Read More
Trends in music come and go, but the crown jewel... Read More
... Read More
With cell phones quickly becoming an important part of our... Read More
You're never too old to have some fun. With the... Read More
Technology advances in cellular phone field.Cellular phone shoppers can find... Read More
When the first cell phone arrived onto the market it... Read More
In today's world of communication technology, there's a lot out... Read More
Cellular phones and pagers are part of the "now" generation,... Read More
Camera cell phone video - description.Camera cell phone video is... Read More
Local Businesses have Been Slow to Capitalize on Search Engine... Read More
Cellular phones are used by millions of people in the... Read More
You can now save quite a bit of money on... Read More
Some people purchase a cellular phone for emergency use only,... Read More
Voice Mail put simply In its simplest form a voice... Read More
Switching cell phone providers allows consumers the opportunity to purchase... Read More
Does that necessarily mean that there are no terrorist communications... Read More
Discounted Mobile Phone AccessoriesMobile Phones have become a part of... Read More
Bluetooth headsets make up one of the fastest wireless markets... Read More
There are a lot of benefits that are offered by... Read More
Firstly, it's vital to point out that this short report... Read More
Choosing a cellular phone plan for all your needs.Cellular phone... Read More
A lot of myths exist regarding as to whether the... Read More
Wherever you're located, the likelihood of having a choice among... Read More
When a person moves, they need to hook up utilities.... Read More
PREPAID CELLULAR TIMEPrepaid Cellular Are A Smart Choice!There are huge... Read More
Most Asian cellular carriers mulling over 3G have chalked out... Read More
Mobile & Cell Phone |