FIND:    


Subscribe to NewsFactor Magazine

November 12, 2005
Updated Daily

Home
Wireless Networking
Mobile Devices
Wireless Chips
Mobile Data
Wireless Security
Wireless Tracking
Product Reviews
Wireless Systems
NewsFactor Magazine
Blog Bytes

Get your complimentary issue
See what's inside (free registration)
Change your address
Free Newsletters
Top Tech News
 
CRM Alert
 
Wireless Industry Alert
 
Enterprise Security Report
 
Data Storage Report
 
BPM Industry Alert
 

advertisement


Wireless Security

Airborne Viruses: Real Threat or Just Hype?


"The biggest threat that I see right now is that Research In Motion's Blackberries and palmOne's PDAs are connected to names and addresses," said IBM Global Solutions Manager for Managed Security Services Doug Conorich.


Verity Search: Business search that brings together all of your business content. Specifically built for businesses. Tunable to each business and the unique needs of each job function and role. Enforces the organization�s security, privacy, and compliance model. Delivers the most relevant results.


When it comes to viruses, worms and other forms of malware infecting smartphones Latest News about smartphone and PDAs Latest News about PDAs, securityRelevant Products/Services from Messagelabs vendors have been warning of the possible dangers for months. Until recently, however, their cries of alarm drew yawns from most industry analysts and security experts.

A case in point is a Gartner Latest News about Gartner report, released this summer, that concluded mobile-phone Latest News about mobile phones users will not see much virus activity in their mobile devices for at least two years. The report said that, for one, not many U.S. consumers have smartphones with which they exchange executable files. Second, the U.S. mobile-phone market lacks a dominant operating system for virus writers to target.

IDC research analyst David Linsalata presented a similar viewpoint about the impact of a new malware threat that targets smartphones running the Symbian Latest News about Symbian Series 60 operating system. "Viruses and malware are certainly a threat that should be watched, but they are not necessarily an immediate threat," he said.

"These types of viruses only tend to affect smartphones that have the advanced capabilities that can run them," he explained. "With Doomboot.A, once the smartphone is infected, it sends out SMS Latest News about SMS messages, which drains the battery Latest News about Batteries, and you end up losing your data."

However, the occurrence of Doomboot.A might signal that it is time to review the dangers and determine just what enterprises need to know to protect wireless Latest News about wireless devices in the hands of mobile workers.

Measuring the Threat

"The threat, meaning the essential impact of losing data to a virus, is pretty serious, and I base that on the extent of mobile connectivity and the damage that could be done," said McAfee Latest News about McAfee Mobile Solutions senior product manager Drew Carter.

The Doomboot.A virus, for example, features an embedded worm called CommWarrior.B that perpetuates itself by sending out a flurry of unauthorized messages using the Symbian smartphone's Bluetooth Latest News about Bluetooth radio.

The malware program relies on smartphone users downloading infected files onto their handsets, either from the Internet or by way of wireless Bluetooth or infrared connections.

Smartphones represent only a fraction of the total mobile-phone universe, and the Symbian OS is just one system among many offerings for smartphones. However, one disturbing implication of this particular threat is its proof-of-concept demonstration of how to hit user finances by surreptitiously sending out thousands of costly text messages.

Potential Impact

Perhaps the most immediate threat from a smartphone virus is the potential access to contact lists in infected phones. Even worse than inconvenience, such an attack could be costly.

"The biggest threat that I see right now is that Research In Motion's Latest News about Research In Motion Blackberries and palmOne's Latest News about palmOne PDAs are connected to names and addresses," said IBM Latest News about IBM Global Solutions Manager for Managed Security Services Doug Conorich.

"If somebody devised a virus sent out with a 'payload pull' and an 'address book out' it could send out messages to all those listed in the [handset's] address book," noted Conorich. "At 10 cents a message or more on some of the [wireless] plans, you can see that that cost to smartphone end-users could add up rather quickly."

And, as mobile malware evolves, the threat to enterprises could become even greater. "If you work for a multimillion dollar enterprise and a virus zips off all your files and sends them to someone else, then that could be a big problem," Linsalata said.

"One of the things that the OS people will have to change is the way that their phones accept applications...so that an SMS message will not be able to download an application and install it on the smartphone, which is the way that the Symbian one works," Conorich said.

Determining Responsibility

The question of who bears the burden of blame and liability is one of the first issues that mobile service providers will have to tackle when mobile viruses become widespread.

"The software vendors that produce mobile phone operating systems definitely have the responsibility of issuing patches to their products," said McAfee Mobile Solutions senior vice president Victor Kouznetsov. "But this is a totally separate issue from determining who is responsible for protecting smartphone users from a financial standpoint."

In today's wireless world, most operators focus their sales efforts on individual consumers despite the increasing popularity of taking enterprise data mobile, noted Kouznetsov. So the temptation is to blame the individual end-user.

Kouznetsov admitted, however, that antivirus tools are not yet widely available for mobile users. Thus, dealing with malware is currently outside the scope of individual subscribers.

"At this point it is the wireless operator's financial responsibility to address the issue," advised Kouznetsov. "Otherwise, consumers might feel threatened into not buying a Nokia Latest News about Nokia phone running the Symbian OS."

Pressuring Wireless Carriers

In the U.S., cell-phone Latest News about cell phones manufacturers are not directly accessible to the consumer, whether the user is an individual or a company buying many phones. The wireless provider selects the phones available and handles the configuration options. So the phone users have to rely on the service provider on matters involving virus protection.

"Enterprises, therefore, would be well advised to contact the operator they are using and standardizing on, and then demand that the operator include the technology and provide it on their handsets, or ask whether the operator will be including it in the future," Kouznetsov said.

Wireless carriers already are starting to feel the responsibility for embedding protection into their networks. In fact, McAfee already provides Japanese carrier NTT DoCoMo Latest News about NTT DoCoMo with malware-protection software that has been embedded in seventeen different phone models, Kouznetsov said.

"For the carrier it could be a powerful differentiating factor to say, 'We will protect you and make sure you are secure,'" Linsalata suggested. "But I can't see a carrier simply saying, 'You will always have antivirus protection and we will provide it for you.'" Linsalata sees malware protection emerging as a series of partnerships between wireless providers and security vendors.

Requirements for I.T. Managers

Another challenge that enterprises face is establishing the right standards and policies for the mobile workforce. "Mobile devices are often purchased by individuals who also want to access enterprise resources," Carter said.

"But does this really make sense? Today the technology is somewhat immature, but as it reaches a higher level of penetration, companies will need to adopt a more sophisticated approach," he suggested. "The other option is for enterprises to provide the mobile devices and set the standards, so if mobile workers want to connect to the network, then they need to buy these devices."

Despite all the malware hoopla, many viruses can be defeated using common sense. Mobile-device users will have to start following the same safe-use practices that they should be using on their computers, security experts emphasized.

"If you get a file from a friend, make sure he really wants you to install that new game or whatever," Linsalata said, adding that smartphone users should look for the industry certification standard for smartphones running the Symbian OS before installing anything. "If you get a message that the program is not Symbian Signed, first ask yourself whether you are really sure you want to install it," Linsalata said.

Bigger Enterprise Concerns

Going forward, one key for enterprises is to stay aware of this problem. According to Linsalata, mobile malware will only grow into a more significant threat as time goes on. But at the moment, the bigger concerns enterprises face are much simpler, he said.

Enterprises should remain centered on physical device security. They should concentrate on being able to wipe devices remotely and make sure that policies for passwords and data encryption Latest News about encryption are in place.

"Make sure the devices are physically secure with the data they contain backed up and encrypted," Linsalata said.

These more pressing needs should take priority because anyone can lose a device, but not everyone's device can get infected by a virus, at least right now, Linsalata said. "Focus on the more pressing security concerns about theft or physical loss in some other capacity," he added.

advertisement


 More on this topic...
1. Enterasys Beefs Up WLAN Security
2. U.S. Passports To Get RFID
3. Singapore Regulates Prepaid Phones
4. Mobile Phones Used in Fighting Crime
5. E-Mail Encryption Comes to BlackBerry


advertisement


 Most Popular Articles
1. FTC Shuts Down Major Spyware Ring
2. Intel Goes Global with WiMax
3. Local Law Targets Wi-Fi Networks
4. Fujitsu Set To Debut Dual-Core Servers
5. New Blood in Japan's Mobile Market


advertisement


 Random Bytes
Review: Motorola i930 SmartphoneMotorola Gives iTunes Another Try
Promise of WiMax Long-Range WirelessEnterasys Beefs Up WLAN Security


advertisement

Have an informed opinion on this story?
Send a Letter to the Editor.
We want to know what you think.
Send us your Feedback.

 Related Stories  Latest News & Special Reports
Security Vulnerabilities on the Rise
(25-Jul-05)
Emerging Markets Adopting Mobile Phones
(21-Jul-05)
Microsoft Licenses Finjan Security Patents
(21-Jul-05)
Report: Mobile Phone Sales Will Hit One Billion by 2009
(21-Jul-05)

 Intel Goes Global with WiMax
 New Blood in Japan's Mobile Market
 Local Law Targets Wi-Fi Networks
 Promise of WiMax Long-Range Wireless
 Cingular Slashes iTunes Phone Price
 Motorola Gives iTunes Another Try
 Analysts: Big Year Ahead for RFID

 Sponsored Links

Bringing Paper and Online Processes Together for the Common Good.

Experience CRM Success with Salesforce.com

Get award-winning tech support with HP nc6120 Business Notebooks.

Lower TCO? Get the Facts on Windows Server and Linux.

TLS Medical Products Customer Strategy Summit 2006.

Take the BPM Process Review & enter to win a $200 AMEX Gift Cheque.

See how EDS goes further to deliver effective technology service

SAP NetWeaver improves analysis and accelerates decision making.

Gig-E Wireless Bridges. Online price estimates: www.lightpointe.com

Free special reports about CRM from Oncontact Software.

Pegasystems SmartBPM Suite helps you close the execution gap.

Teleportation For The Information Age � Free Timbuktu Pro Trial!

Web threats are evolving. Is your security? Click here.

Find out how business process management helps you work smarter.

Tame the 2 Headed Monster � Cost Efficiency & Revenue in Service.

Complex IT processes now simplified. Get PlanView Enterprise.

Microsoft Free Security Tools & Updates.

Make your ITIL implementation successful with a Malcolm Fry WP!

Best in class enterprise IT solutions from 3Com

TIBCO is a recognized leader in BPM. Find out why.

Verity Search: A Business Search Engine for Your Business Content

TARGUSinfo � On Demand data about the people contacting you.

BZ Research names JBoss #1 for J2EE application servers.

Subscribe to AT&T's Networking Exchange - the IT information source.

TechExcel CRM - Powerful, configurable, affordable and easy to use.

Living in L.A.? Click here for Sales, Journalism & I.T. JOBS.

White Papers
The Case for BPM - How BPM brings real business results.

Make your ITIL implementation successful with a Malcolm Fry WP!

Read a white paper about best in class VoIP solutions from 3Com.

Fast Ethernet Wireless Bridges - LightPointe White Papers

Ticketmaster's World-Class Customer Solutions with TARGUSinfo®

More White Papers...

Security Spotlight

Hackers Exploit Secret Copy Protections Found on Sony CDs
The can of worms opened by Sony's surreptitious installation of copy-protection technology on its music CDs keeps getting bigger, as malware writers have exploited the vulnerability.

After Criticism, Sony Issues Fix for Hidden Rootkits
Sony has admitted that it included a stealth rootkit on some music CDs shipped in 2005 and has issued an update to remove the hidden software one day after it was discovered.

Review: Symantec Mail Security 8200 Appliance
Symantec's Mail Security 8200 series is a set of hardware appliances designed for those who need reliable and efficient mail security for large networks.
A D V E R T I S E M E N T
Enterprise Hardware Spotlight

Fujitsu Set To Debut Dual-Core Servers
Fujitsu Computer Systems has unveiled new servers powered by dual-core AMD Opteron processors: the Primergy BX630 blade server and the Primergy RX220 rack server.

HP To Launch Itanium 2 Blade Servers
HP this week unveiled its first blade server supporting the HP-UX operating system and powered by Intel's Itanium 2 processor. The new offering targets distributed-computing networks.

Review: HP Compaq tc4200 Tablet PC
Tablet PCs are rivaling their notebook counterparts these days. The HP tc4200 Tablet PC is no exception, packing enough hardware to outperform many midlevel business laptops.
A D V E R T I S E M E N T
Mobile Enterprise Spotlight

Intel Goes Global with WiMax
WiMax wireless broadband is gaining significant momentum with Intel announcing that carriers across the globe are deploying new WiMax networks based on the company's tech.

New Contenders Enter Japan's Mobile Market
Three Tokyo-based companies were formally granted access to Japan's mobile phone market Thursday, signaling changes ahead for a sector that has not seen a new entrant for 12 years.

Local New York Law Targets Open Wi-Fi Networks
Responding to concerns about wireless vulnerabilities, lawmakers in New York have introduced legislation requiring those offering open Wi-Fi hotspots to secure their networks.
A D V E R T I S E M E N T
Tech Trends Spotlight

Virtual Resort Sells for $100,000
For a guy who just spent a ton of money for a piece of property that has no physical attributes, Jon Jacobs feels upbeat about the investment and is confident it will pay off in short order.

High-Tech Condos Attract Buyers
To hold their value in the red-hot U.S. residential market, condominiums are sporting high-tech amenities that will support emerging technologies in the coming years.

Get Ready for Software's 'Live' Era
On November 1, Bill Gates announced what he is calling the "live" era of software. Is this a well-considered response to market pressures or another attempt to revive the failed ASP model?
A D V E R T I S E M E N T
Navigation
Wireless NewsFactor
Home | Wireless Networking | Mobile Devices | Wireless Chips | Mobile Data | Wireless Security | Wireless Tracking
Product Reviews | Wireless Systems |
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Data Storage Today | Wireless NewsFactor
Enterprise Linux I.T. | Enterprise Windows I.T. | Enterprise Security Today

NewsFactor Network Enterprise Applications Sites
BPM Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2005 NewsFactor Network. All rights reserved.