web stats service from statcounter


There are both simple and sophisticated ways to protect cell phones from attackers in the U.S. Since phones with Bluetooth connections and data capabilities are the main targets of malware, it is generally the Smartphone that must be secured against vulnerabilities. Cell-phone threats are primarily spread in three ways, Internet downloads, Bluetooth wireless connections, and multimedia messaging service (MMS).

Many protections are built into devices, such as allowing users to set a strong, five-digit PIN code for Bluetooth devices so that access is harder to crack, and most digital phones have encryption capabilities, which reduce the chance of someone latching onto a conversation. Mobile anti-virus software is also becoming more available, which is used for various device platforms.

Cell phone use varies around the world. In Japan, cell phones are used for financial transactions similar to a credit/debit card. Other uses include watching live TV, gaming, picture enhancement, and GPS navigation. On average, Japan is approximately five years ahead of the U.S. in regards to cell phone technology.

With the advanced use of cell phones in Japan, security capabilities are advanced as well. For example, NTT DoCoMo's P903i includes security features such as face recognition and password protection in order to make financial transactions. Another protection has the owner of a cell phone keep a security chip in their pocket or purse, and anytime the cell phone is out of range, it will lock and prevent usage. These methods, plus the protections mentioned for the U.S. above, can provide greater security, however, the risk of using the Internet and data being hacked during transmission is still high. Additional protection by cell phone service providers and manufacturers need continuous improvement because the wireless technology, and threats against it, is here to stay.

Cell-phone viruses downloaded from the Internet spread the same way as a computer virus. Infected files are downloaded using the phone's Internet connection, or downloaded to a computer and then synchronized or transferred to the phone. In order to protect a cell-phone from this type of exploit the user should verify the authenticity of downloads to make sure they are from trusted sources. In addition, users should consider using mobile antivirus software and synchronize files selectively since frequent synchronizing gives the maximum opportunity for transferring infected files.

Bluetooth wireless connection threats occur when a user receives a virus via Bluetooth while the phone is in discoverable mode, thus the user should turn off Bluetooth and discoverable mode until it is needed. In order for a virus to spread via an MMS message it must be included as an attachment. In order to stop a virus propagated in this manner, the user should not open unexpected attachments.

Users should be vigilant in keeping their software current by regularly checking for new versions of operating system and applications. In addition, they must exercise caution towards suspicious attachments, downloads, and activity.

Multiple levels of defense create the most effective protection. The first layer should secure the cellular infrastructure, including transmission towers and the mobile telecommunications switching office. The second level of protection resides with phone manufacturers and software developers. The third level of protection is the end user's responsibility.

A simple step end users can take is to monitor their battery usage, since one telltale sign of active malware is a quickly drained battery. Also, users should lock their keypad when not in use to prevent unauthorized access and change passwords frequently.








The author is a computer security professional with experience protecting small business and home networks. He also teaches the basics of computer network security at 365 Computer Security Training where he blogs regularly and creates video training and educational materials related to information security. Learn more at http://www.365ComputerSecurityTraining.com


14 Nov 2010

0 comments:

Post a Comment

:) :)) ;(( :-) =)) ;( ;-( :d :-d @-) :p :o :>) (o) [-( :-? (p) :-s (m) 8-) :-t :-b b-( :-# =p~ $-) (b) (f) x-) (k) (h) (c) cheer
Click to see the code!
To insert emoticon you must added at least one space before the code.

 
Top