AllPoint
Click Here
ApplicationsCalculatorsAbout UsRatesMembershipInsuranceFAQ'sHome
Site Search:       Sunday, October 29, 2006
Savings Accounts
Regular Share
RSVIP
Holiday Savings
HEWEY Shares
CU Succeed
Silver Share Certificates
ATM Card
Star Program
Seminars
Money Savvy Articles
Retirement Articles
Account Agreement Disclosure


Is your cell phone at risk? - Network World

Is your cell phone at risk?

Not at the moment, although new strains of viruses that infect smartphones pose yet another network security problem that you'll have to worry about in the future.

Recent headlines such as "Cabir worm wriggles into U.S. mobile phones" conjure up the image of old tabloid headlines touting killer bees heading to the U.S. from South America. The latest buzz is that your cell phone could be infected with a nasty virus and you might not even know it.


Protective action
Spam that follows you and makes you pay


Granted, your chances of infection are probably less than getting stung by killer bees, but mobile threats are only in their infancy and will continue to grow in sophistication, making the problem something IT staff should get on their radar early.


New! Watch this Network World Webcast - Cellular Data and Convergence: Mobility Reaching the Red Zone

There are several mobile phone viruses in the wild at the moment, including Skulls, Cabir and Fontal. And, like many PC-based viruses, each has its own set of variants aimed at keeping users and security vendors on their toes.

Skulls spreads by hiding in what looks like a harmless application for your mobile phone, be it a "theme" manager application or simple game. It replaces system icons with a picture of skull and cross bones and makes it difficult to access phone functions. Cabir variants - there are roughly 20 - use Bluetooth wireless technology to spread between phones in close proximity. And Commwarrior uses the Multimedia Message Service (MMS) to send infected files that look to be important security updates between devices. Commwarrior also will reset the device on the 14th day of the month, thus deleting all settings and data, if the virus is not removed in time.

Fortunately, the number of reported infections of each variant of Cabir, Commwarrior and Skulls fall in the 0-to-49 range, according to Symantec's virus threat database. Removal of the viruses is relatively easy, usually involving the deletion of infected files. In rare, more severe cases, the device might need to be reset to the original factory settings.

Vulnerable devices

The current slate of viruses all target the Nokia Series 60 smartphones running the Symbian operating system . A smartphone combines phone and PDA functions into one device. The good news is that 96% of the phones sold last year are not smartphones, use an operating system other than Symbian and are, therefore, completely immune to existing mobile threats.

Symbian holds the biggest share of the smartphone operating system market, with 13.65 million units shipped in 2004. Other operating systems such as palmOne and Windows Mobile accounted for another 6.6 million units, according to In-Stat/MDR. By comparison, the total number of worldwide mobile phones sold in 2004 was 678.9 million, says Neil Strother, a senior analyst at In-Stat.

Of the major wireless providers in the U.S., only T-Mobile and Cingular offer Symbian-based phones. Verizon Wireless and Sprint don't carry any Symbian devices.

Even if one does have a Nokia Series 60 device, it takes some effort to catch the virus. Unlike many of today's network-based worms that can spread between PCs and servers without any end user interaction, mobile viruses are far less sophisticated. With Cabir, users must have Bluetooth turned on and visible to nearby phones that are similarly equipped. An infected phone will constantly search for other Bluetooth devices to which it can pass its payload. The target machine will get a message asking the user to accept and install a SIS file (a Symbian file format) being transmitted via Bluetooth wireless. Users would have to accept both the transfer and installation of application to get infected.

Click to see:

How a cell phone virus spreads
1. A phone infected with the Cabir virus uses Bluetooth to continuously search within a 32-foot range for other devices to target. It attempts to send infected SIS files to the first Bluetooth-enabled device it can find.
2. The worm arrives at the target device, which must be running the Symbian OS and have Bluetooth turned on in “discoverable” mode. The targeted device will prompt its user to receive a message from the infected device.
3. If the user chooses to accept the message, her phone will issue a security warning. Disregarding the warning, she opts to proceed.
4. The user then will be prompted to install the virus, which also goes by the alias “caribe.” The user chooses yes.
5. The Cabir infection takes hold. The cycle repeats when the worm in the original phone and newly infected device start looking for new devices to infect via Bluetooth.

Commwarrior works in a similar fashion, except it uses an MMS message that claims to be delivering an important Symbian security or application update, says Travis Witteveen, vice president of American operations at anti-virus vendor F-Secure. Targeted users still have to accept the download and install the file to be infected. Commwarrior does add a bit of nastiness in that it embeds itself into application files on the device, making it more difficult to disinfect.

"Consumers have to go through hoops to get the virus," says Laurie Armstrong, a spokeswoman for Nokia, which has a large financial stake in Symbian. "These are not crazy, freely spreading viruses."

There's no inherent flaw - such as a buffer overflow or missing security feature - that virus code writers are exploiting in the Symbian operating system or Nokia's implementation of it. "The threats are targeting high-end phones that have fully functional operating systems and have the ability to download and install arbitrary applications," says Oliver Friedrichs, senior manager at Symantec Security Response.

Symbian offers a signed application service that digitally certifies the author of an application and that the application has not been changed since certification. When non-signed applications are installed, users get an additional "do you really want to do this?" warning.

"A Symbian-signed application [or any signed application in general] is a measure of certain standard of application," says Simon Garph, vice president of marketing at Symbian. "You know where it comes from and that it's been through a certain series of tests."

The mobile-oriented viruses are not designed to do much more than spread, although they might mess up a device enough that it has to be reset to the original factory settings or drain the battery because an infected unit constantly searches the airwaves for a new target.

"Right now they're more proof-of-concepts," Friedrichs says. "People are writing them to show that something can be done or that the phone platforms can be impacted by threats, just like the PC is."   Continued

1 |2Next >>

Sign up for the Video & Podcast Alert Newsletter

Interview: A blind eye to Web applications?
IT people see only 1% of the application errors that plague end users. Coradiant co-founder tells you why and how you can fix that in this week's Network World Hot Seat. Watch now

Network World Newsletter

Sign up for some of our Wireless & Mobile newsletters.

Wireless in the Enterprise
Cool Tools alert
Messaging
Wireless News Alert
 All newsletters  

E-mail Address:
Sponsored Links

Find IT Consultants
Post Your Project for Free. Get Bids from Thousands of Pre-Screened Consultants.

RESEARCH CENTERS:
Applications | Application Development | Applications-Standards | Applications Vendor Solutions | Collaboration | CRM / ERP | Databases | Directories | Grid Computing | Java | Messaging | .Net | RFID | SOAP | Web Services | XML | Convergence & VoIP | Convergence Regulatory | Convergence Services | Convergence Standards | Convergence VoIP Vendor Solutions | Video | IP PBX | SIP | VoIP | VoIP Services | E-Business | DNS | RFID | Supply Chain | Web security LANs & Routers | Acceleration | Gigabit Ethernet | Lans-Standards | Routers | Wireless LANs | Network Management | Application Management | Desktop Management | Management Test Patch Management | Operating Systems | Linux | NetWare | Unix | Windows Outsourcing | Managed Services | Offshoring Security | Firewalls - VPN - Intrusion | Identity management | Patch Management | Microsoft Security | Privacy | Security Standards | Spam & Phishing | Viruses & worms | Web Security | Wireless Security | Servers & Desktop | Backup-Recovery | DataCenter | Desktops | Desktop Management | Grid | Servers | Server Blades | Servers Desktops | Utility Computing | Small & Medium Business | Broadband | Telework | Handhelds & PDAs | Home Networking | Security | Storage | Compliance | Infiniband | Network-Attached Storage | SANs | Storage Management | Storage Virtualization | Virtualization | Vendor News | Bankruptcy | Earnings | Lawsuits | Layoffs | Standards | Start Ups | Vendor Markets | Education | Financial | Healthcare | HIPAA | Manufacturing | Retail | Wide Area Network | Broadband | Carriers | Frame Relay | Metro Ethernet | MPLS | Service providers | Wireless services | Wireless & Mobile | Wireless LANs | PDAs & handhelds | Wireless Security | Wireless Services | Wireless Standards | Wireless Switches | All Company Profiles | Download Library
Copyright, 1994-2006 Network World, Inc. All rights reserved.



Collaborative Divorce Softens Sting of Split

Courtesy Pay Abusers Pay the Price

Watch for Disclosure Signs at Checkout

Wealth-Building Strategies That Anyone Can Master

Financial Elderly Abuse: Do You Know the Signs?

Before You Stop Automated Payments

Budget for Your Pet's Life-Long Care

Make a Will to Have the Last Word

Take Time to Pick a Computer for College

Disaster-Proof Your Important Papers

Debit Card Debate: Check-Out Line Dilemma Reveals Real Differences

Who Pays for Hospice Care?

The Down-Payment Debate: Can You Afford No or Low Down Payments?

Grandparents Pitch in With Financial Help

Introducing the Roth 401(k)--A New Workplace Savings Opportunity

Future Grads: Consolidate Loans Before Summer

Credit/Debit Cards, Checking Accounts, Teach Teenagers to Handle Money

Pension Participants: Expand Retirement Savings for Future Security

Ten Resolutions to Trim Spending and Reduce Financial Stress

Preparation Softens Blow of Alternative Minimum Tax

A Long, Cold Winter? Simple Energy Projects Can Save You a Bundle

Health-Care Flex-Spending Accounts Get More Flexible

Protect Your Assets With a Trust Agreement

"Remarried, With Children" Brings Special Financial Challenges

Fast Fact: Advance Directive Q & A

Upping the Ante: Stakes Are High for Young Adults Playing Poker

Suddenly Solo--Life After Losing a Mate

What Bankruptcy Reform Means to You

Choose the Right Cell Phone for You

Online Banking Makes Money Management Simple and Safe

Desktop or Laptop--What's Right for You?

How to Keep Your Job When You Become Ill

Shalt Thou Buy? See If a DVR (Digital Video Recorder) Is Right for You

Back to School: Plan Your Budget

Savvy Shoppers Know "Minimum Advertised Price" Isn't Always the Bottom Line

Health Savings Accounts:
First Aid for Health-Care Bills?


Back to the 1970s? Inflation Outlook

Prenups Clarify "Yours, Mine, and Ours"

Design an IRA Strategy That's Right for You

Personal Property Appraisers Distinguish Between Trash and Treasure

Preventive Health Care: An Ounce of Prevention

Is Your TV Set to Go Digital?

Birth of a Consumer: How to Teach Your Preschooler About Money

Trusts: Securing the Financial Future for Special Needs Adults

Farmers and Consumers Connect Through Community Supported Agriculture

High Cost of Health Care Robbing Retirement

Going Solo With Health Insurance

Tax Time: Early Birds Catch a Breather

Tsunami Relief: Be an Informed Donor

Now's the Time to Max Out Flex Spending

We Love Our Debit Cards

Gift Cards Keep Giving--But Not Always to You

Type by Talking--The Scoop on Voice Recognition Software

Check 21 Speeds Checking, Sinks Your Float

Use Direct Deposit and Automatic Transfers to Simplify Finances

Making Financial Room for Baby

Teaching Young Children About Money

Staying Safe at the Cash Machine

Disaster-Proof Your Important Papers

Launch of New Home & Family Finance Radio Initiative

Tips for choosing benefits during open enrollment

Middle class families in financial bind

Disaster preparedness: Tips for keeping cash on hand

Preparation means peace of mind

Some habits save hundreds on energy bill

CUNA launches weekly consumer finance radio show

Weave money lessons into daily routine

September is national preparedness month

Online banking: Know the answers or get locked out

Who will manage your assets when you can't?

Use back-to-school shopping as teachable moment

Be proactive in curbing health care costs

Financial notebook provides road map, peace of mind

Tips for using plastic overseas

Sales tax holiday catches on

Consumers fork out $16 billion for extended warranties

Keep a lid on summer cooling costs

More than $60 billion just waiting to be claimed

Credit counseling--via phone or face-to-face--helps debtors

Majority of Gen X women in debt, lack investments

Keep a lid on summer energy costs

Government website offers free 'My Money' tool kit

Can't find that file? Try these simple alternatives

Using online bill-pay helps prevent ID theft

Good debt/bad debt 101

Tips for merging money with your mate

Consumer website calculates cost of payday loans

It's Financial Literacy Month: Can you pass the test?

Money and marriage: Talk to ease the tension

Five financial tips for college grads

Prepaid options critical, but costly, for unbanked consumers

Survey        Privacy Policy/Disclosures        Site Map         Contact Us       Home

© 2004 HEW Federal Credit Union. All rights reserved.
HEW Federal Credit Union is federally insured by the National Credit Union Administration.

Designed & Powered by Cambium Group, LLC