FIND:    


Subscribe to NewsFactor Magazine

November 11, 2005
Updated Daily

Home
Wireless Networking
Mobile Devices
Wireless Chips
Mobile Data
Wireless Security
Wireless Tracking
Product Reviews
Wireless Systems
NewsFactor Magazine
Blog Bytes

Get your complimentary issue
See what's inside (free registration)
Change your address
Free Newsletters
Top Tech News
 
CRM Alert
 
Wireless Industry Alert
 
Enterprise Security Report
 
Data Storage Report
 
BPM Industry Alert
 

advertisement


Wireless Security

Analysts: Mobile Viruses Pose Little Threat


The real danger of mobile-phone viruses presently, said Graham Cluley of antivirus software firm Sophos, is that theoretical talk of them will distract enterprise I.T. groups from the real problems at hand.


Verity Search: Business search that brings together all of your business content. Specifically built for businesses. Tunable to each business and the unique needs of each job function and role. Enforces the organization�s security, privacy, and compliance model. Delivers the most relevant results.


To hear some vendors in the antivirus industry tell it, the sky is falling when it comes to mobile-phone viruses. Before long, goes the story, all Bluetooth-enabled mobile phones Latest News about mobile phones will be rendered useless by viruses transmitted over short-range wireless Latest News about wireless networks.

But many analysts and securityRelevant Products/Services from Messagelabs professionals disagree with such fearful thinking. Research firm Gartner Latest News about Gartner has come forward to predict that mobile viruses will have little or no impact until at least 2007.

Graham Cluley, of antivirus software firm Sophos Latest News about Sophos, agrees in general with that prediction -- that mobile viruses are not a real, current threat. "You've got more chance of being hit by a meteorite right now than being hit by a mobile phone virus," he said.

Show Me the Money

Indeed, virus writers have become more sophisticated in recent years, said Cluley. Instead of seeking the notoriety of successfully pulling off a global attack, they now are organizing themselves into criminal gangs and seeking real profit from their activities.

"There is no incentive for those gangs to look to the mobile-phone platform," Cluley contended. "They are doing very well on Windows-based personal computers."

Thus, argued Cluley, the success of criminal efforts in the Windows realm might prevent those virus writers from targeting another platform. In addition, the learning curve is steep in shifting to another platform, and the potential for profit by writing viruses is as yet unknown.

Theoretical vs. Real Threats

The real danger of mobile-phone viruses presently, said Cluley, is that theoretical talk of them will distract enterprise I.T. groups from the real problems at hand. If people lose focus on what's going on right now, he said, those Windows-based viruses will gain ground on corporate security efforts, ground that I.T. groups cannot afford to cede.

Furthermore, asserted Cluley, it is much easier to stem the tide of viruses transmitted through cellular networks at the level of the wireless service provider than it is to stop viruses on the Internet.

All mobile-messaging transmissions, for example, must pass through one of only a few network providers before being received by anyone's mobile handset. Mobile providers, therefore, could end up blocking messages laden with viruses, whereas Internet messages do not have the same centralized infrastructure through which they pass.

Locking It Down

Of course, being able to lock down a messaging system against a new mobile virus doesn't translate to being able to block a Bluetooth Latest News about Bluetooth virus. Bluetooth, a short-range wireless technology used to shuttle data typically from consumer-electronics devices to computers, is cropping up in mobile phones, particularly in smartphones Latest News about smartphone.

While there have been a handful of reported viruses that are contagious by way of Bluetooth, not many phones have Bluetooth capability just yet. When the majority of phones do, virus writers might well turn their attention more completely to mobile platforms.

advertisement


 More on this topic...
1. Enterasys Beefs Up WLAN Security
2. U.S. Passports To Get RFID
3. Singapore Regulates Prepaid Phones
4. Mobile Phones Used in Fighting Crime
5. E-Mail Encryption Comes to BlackBerry


advertisement

Have an informed opinion on this story?
Send a Letter to the Editor.
We want to know what you think.
Send us your Feedback.

 Related Stories  Latest News & Special Reports
Motorola, DoCoMo Launch 3G Phone
(22-Jun-05)
Cisco's CTO Says WiMax Is Overrated
(22-Jun-05)
Liberty Alliance Develops Mobile-Privacy Specificaton
(21-Jun-05)
Get Ready for Intel's Agile Radio
(20-Jun-05)
PBL and Australian Telco Optus Form Alliance
(20-Jun-05)

 Intel Goes Global with WiMax
 New Blood in Japan's Mobile Market
 Local Law Targets Wi-Fi Networks
 Promise of WiMax Long-Range Wireless
 Cingular Slashes iTunes Phone Price
 Motorola Gives iTunes Another Try
 Analysts: Big Year Ahead for RFID

 Sponsored Links

Bringing Paper and Online Processes Together for the Common Good.

Experience CRM Success with Salesforce.com

Get award-winning tech support with HP nc6120 Business Notebooks.

Lower TCO? Get the Facts on Windows Server and Linux.

TLS Medical Products Customer Strategy Summit 2006.

Take the BPM Process Review & enter to win a $200 AMEX Gift Cheque.

See how EDS goes further to deliver effective technology service

SAP NetWeaver improves analysis and accelerates decision making.

Gig-E Wireless Bridges. Online price estimates: www.lightpointe.com

Free special reports about CRM from Oncontact Software.

Pegasystems SmartBPM Suite helps you close the execution gap.

Teleportation For The Information Age � Free Timbuktu Pro Trial!

Web threats are evolving. Is your security? Click here.

Find out how business process management helps you work smarter.

Tame the 2 Headed Monster � Cost Efficiency & Revenue in Service.

Complex IT processes now simplified. Get PlanView Enterprise.

Microsoft Free Security Tools & Updates.

Make your ITIL implementation successful with a Malcolm Fry WP!

Best in class enterprise IT solutions from 3Com

TIBCO is a recognized leader in BPM. Find out why.

Verity Search: A Business Search Engine for Your Business Content

TARGUSinfo � On Demand data about the people contacting you.

BZ Research names JBoss #1 for J2EE application servers.

Subscribe to AT&T's Networking Exchange - the IT information source.

TechExcel CRM - Powerful, configurable, affordable and easy to use.

Living in L.A.? Click here for Sales, Journalism & I.T. JOBS.

White Papers
The Case for BPM - How BPM brings real business results.

Make your ITIL implementation successful with a Malcolm Fry WP!

Read a white paper about best in class VoIP solutions from 3Com.

Fast Ethernet Wireless Bridges - LightPointe White Papers

Ticketmaster's World-Class Customer Solutions with TARGUSinfo®

More White Papers...

Security Spotlight

Hackers Exploit Secret Copy Protections Found on Sony CDs
The can of worms opened by Sony's surreptitious installation of copy-protection technology on its music CDs keeps getting bigger, as malware writers have exploited the vulnerability.

After Criticism, Sony Issues Fix for Hidden Rootkits
Sony has admitted that it included a stealth rootkit on some music CDs shipped in 2005 and has issued an update to remove the hidden software one day after it was discovered.

Review: Symantec Mail Security 8200 Appliance
Symantec's Mail Security 8200 series is a set of hardware appliances designed for those who need reliable and efficient mail security for large networks.
A D V E R T I S E M E N T
Enterprise Hardware Spotlight

Fujitsu Set To Debut Dual-Core Servers
Fujitsu Computer Systems has unveiled new servers powered by dual-core AMD Opteron processors: the Primergy BX630 blade server and the Primergy RX220 rack server.

HP To Launch Itanium 2 Blade Servers
HP this week unveiled its first blade server supporting the HP-UX operating system and powered by Intel's Itanium 2 processor. The new offering targets distributed-computing networks.

Review: HP Compaq tc4200 Tablet PC
Tablet PCs are rivaling their notebook counterparts these days. The HP tc4200 Tablet PC is no exception, packing enough hardware to outperform many midlevel business laptops.
A D V E R T I S E M E N T
Mobile Enterprise Spotlight

Intel Goes Global with WiMax
WiMax wireless broadband is gaining significant momentum with Intel announcing that carriers across the globe are deploying new WiMax networks based on the company's tech.

New Contenders Enter Japan's Mobile Market
Three Tokyo-based companies were formally granted access to Japan's mobile phone market Thursday, signaling changes ahead for a sector that has not seen a new entrant for 12 years.

Local New York Law Targets Open Wi-Fi Networks
Responding to concerns about wireless vulnerabilities, lawmakers in New York have introduced legislation requiring those offering open Wi-Fi hotspots to secure their networks.
A D V E R T I S E M E N T
Tech Trends Spotlight

Virtual Resort Sells for $100,000
For a guy who just spent a ton of money for a piece of property that has no physical attributes, Jon Jacobs feels upbeat about the investment and is confident it will pay off in short order.

High-Tech Condos Attract Buyers
To hold their value in the red-hot U.S. residential market, condominiums are sporting high-tech amenities that will support emerging technologies in the coming years.

Get Ready for Software's 'Live' Era
On November 1, Bill Gates announced what he is calling the "live" era of software. Is this a well-considered response to market pressures or another attempt to revive the failed ASP model?
A D V E R T I S E M E N T
Navigation
Wireless NewsFactor
Home | Wireless Networking | Mobile Devices | Wireless Chips | Mobile Data | Wireless Security | Wireless Tracking
Product Reviews | Wireless Systems |
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Data Storage Today | Wireless NewsFactor
Enterprise Linux I.T. | Enterprise Windows I.T. | Enterprise Security Today

NewsFactor Network Enterprise Applications Sites
BPM Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2005 NewsFactor Network. All rights reserved.