Your mobile phone, [smart phones and PDAs] has spawned a new security hole that the majority of people completely ignore. Most mobile phones can access the Internet and have Bluetooth communication systems for linking other devices without the use of cables. Additionally, smart phones are utilizing Linux and Windows operating systems and have the processing capabilities of a small computer. Since these devices do not have a built in firewall and provide multiple open communication channels, it becomes perfectly clear that mobile phones pose a prime target for attacks
Mobile devices and operating systems smart phones are currently using two operating systems (Symbian and Windows Mobile 5) that are customized to each cellular provider's mobile device. Symbian symbian.com is a lightweight Linux operating system that is bundled with a number of applications that can allow a user to work on the road without the use of a laptop. Microsoft has taken their lightweight Windows OS that was originally developed for the iPaq and into the cellular provider market by developing Windows Mobile 5 (http://www.microsoft.com/windowsmo). Microsoft offers a complement of applications to allow a user to work remotely without the use of a laptop
Current and future mobile threat device viruses began to show up in 2004 with the release of the Cabir virus. Since then, the number of viruses has grown exponentially, which has resulted in both financial and hardware loss. The Skulls and Onehop viruses are designed to completely disable the mobile handset, whereas the CommWarrior virus will start to transmit SMS messages to everyone in your address book, resulting in additional costs on your phone bill
Scan your open Bluetooth connections to see how many open connections you have. Most importantly, educate yourself and those around you. Most of the current mobile viruses can be thwarted by deleting the attachment or not opening it at all. Mobile devices are the next vulnerable resource on the market today and will eventually be targeted by viruses that spread across multiple communication channels. As the complexity, features, and processing power of the mobile devices increase, they will provide a prime avenue for malware to exploit. By protecting your mobile devices with anti-virus and firewalls, as well as disabling unnecessary services such as Bluetooth, you can protect your network and yourself from current and future threats |