Yahoo! Finance: "Redefining personal finance for India's middle class" --> FREE Limited time offer: Sign Up Now
News »Browse Articles » Mobile Handsets will be cyber-criminals` next target --- GTISC report
0
Vote Vote

Mobile Handsets will be cyber-criminals` next target --- GTISC report

Views 4 Views    Comments 0 Comments    Share Share    Posted by Praveen 31-12-2008  
U.S. experts are urging cell phone users to exercise the same caution with their mobiles that they do to protect their computers from spam and virus attacks.

The Georgia Institute of Technology Information Security Center (GTISC) says in its annual Emerging Cyber Threats Report that mobile devices can become targets for hi-tech criminals.

The report suggests that with the rise in the number of smartphone users, more applications will allow financial and payment infrastructure that employs them, and cyber-criminals will try to obtain such sensitive data.

Simeon Coney of Adaptive Mobile, a firm that tracks malware and provides security software for mobile firms, hinted that the number of mobile spam and viruses was increasing.

"One of common types we see now runs amok on the Symbian platform. These viruses work their way through the contact book, sending themselves out to every subscriber who has been called or has called that handset," the BBC quoted him as saying.

He revealed that network operators receive 100,000 virus incidences a day, nearly a 50 per cent rise on last year.

The reason why most subscribers were not infected could be due to mobile viruses` being comparatively unsophisticated at present, he said.

"The first generation of these were fairly easy for mobile operators to detect," he said.

"Just like the first PC viruses came across as screensavers, in the mobile instance they came across as executable files. No-one was ever sending executable files themselves so it was easy to detect and block that.

"But in the last four months, the majority of viruses we now see are of a new type that either masquerade as an MP3 file, a picture file, or a media file," he added.

Coney insists that people better employ the same behaviours familiar from computing.

"People should start to exercise that same caution with their mobile devices that they do today on their PC; think twice before running any attachment from someone you don`t know, check your bill on a regular basis, and ensure your Bluetooth connection is not set in discoverable mode," he said.

The report suggests that co-operation between operators, manufacturers, and application developers can make it easier to develop a robust security infrastructure for mobiles.

Since the average life-cycle of mobile devices is just two years as compared to 10 years for a PC, according to the report, developing security infrastructure for mobiles will happen quickly.

"Because the mobile communications field is evolving so quickly, it presents a unique opportunity to design security properly - an opportunity we missed with the PC," says the GTISC`s Patrick Traynor in the report.

Source:
http://www.rediff.com
0
Vote  Vote
Enter your comment:
No Comments For This News

Search News

What's the News?

Post a link to something interesting from another site, or submit your own original writing for the HR community to read.

Most Popular News

Most Recent User Submitted News

Lessnote
 
Recent (10) | HR | Both
HR | Both   1 of 10
23-09-2019
27-01-2018
27-01-2018
07-08-2017
26-05-2017
Arun
Arun
Read this topic:
Joke ####@@@####
26-05-2017
25-05-2017
03-04-2017
27-03-2017
27-03-2017