|Mobile & Cell Phone Information|
Mobile Devices Security
As this security solution is not such a great idea, other companies have researched, and finally found a new way to prevent cell phones and PDAs theft. This method permits to remotely disable up to four different tasks of a stolen cell phone or PDA, rendering it inoperable. But at the same time data contained in the device are locked. The beauty of this option is that the unit is not damaged in any way - full functionality and data can be easily restored if the device is recovered. Thus, the device is useless to the thief, but it can be reactivated and restored if it is recovered and returned to its rightful owner.
Another new security breach has been encountered this year when reports were received about a backdoor Trojan horse program that can take control over a mobile device. This is the first known backdoor Trojan horse for PDAs. The subject program, identified as Backdoor.Brador.A, attacks PDAs running the Windows operating system. And like all backdoors, it cannot spread by itself. The Trojan arrives as an e-mail attachment or can be downloaded from the Internet. Also, it has a complete set of destructive functions characteristic for backdoors. After it is installed, this small program is activated when the PDA is restarted and begins to look for a remote administrator to take control of the device. Security specialists claim the virus was written by a Russian virus coder since it was attached to an e-mail with a Russian sender address and contained Russian text. Fortunately, the Trojan's threat control and removal was rated as "easy".
The important thing about this virus is not the number of devices affected, because this number is very small, but the fact that this is the first one that appeared on the "market" is considered to be very important. We have to admit that it is hardly surprising that viruses have found their way to mobile devices. This is the natural trend. Where technology goes, viruses will follow. As the new technology shifts into the mobile market, these threats will move in that direction also. The specialists from the Kaspersky Labs claim they were expecting a virus attack on a PDA, due to the latest attacks against other mobile devices. Now, the PDA users look at a real danger and it is a well known fact that interested intruders will grab the chance to attack PDAs and mobile phones in the near future. Virus threats development for mobile devices is passing through the same stages as the one for desktops.
Almost at the same time with the appearance of the first Trojan for PDAs, the first virus to affect cell phones has also arrived. This worm is called "Cabir", and it has been spotted by some security specialists who issued an alert concerning the danger. Cabir spreads using a file named "Caribe.sis" and travels across devices working with the Symbian operating system which is used in PDAs and many cell phones. Cabir places itself usually on a mobile device when a user agrees to a transmission showing the text message "Caribe". After that the worm begins a nonstop search particularly for Bluetooth-connected wireless devices to send itself to. Also, the battery's life of the infected device is harshly reduced during this process. The inventors of Cabir did not design the worm to spread massively. It was intended to be a test demonstrating that these mobile devices can be easily infected by viruses because of their rapid maturation. The worm rated with a low risk because it has to be intentionally activated by a mobile phone user, and also allowing the Caribe package requires pressing a button prior the files can be loaded into the receiving phone.
It was predictable that viruses and worms for cell phones and PDAs would appear. This is the end result of the impressive advances made in mobile communication technology in the past years. Over time, cell phones and PDAs turn out to be more PC-like, making them vulnerable to viruses. And because they are more PC-like, smart cell phones and PDAs are mostly used by companies for mission-critical applications and data storage. Also they are used for receiving emails and text messages just like desktop computers. That makes their users just as exposed to viruses and worms. These security concerns can be dealt with software-encryption solutions that need to be attached to the new devices. The encryption technology expands to mobile devices the identical type of security that many companies have organized into their desktop computers. It encrypts data and prevents illegal access to the data stored within the device, which is either lost or stolen.
This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news
Dayton police investigate after rock is used in possible cell-phone store break-in - Dayton Daily News
Cellular Phone Contract Tips
Choosing a cellular phone contract and choosing a cell phone for you can be very challenging. Choosing a cell phone that's right for you depends on your personal preferences and your needs.
Choosing The Right Phone and Voice Mail System
Phone and voice mail systems can be pretty costly, even for companies with a low number phones. Before investing in any type of phone system or voice mail system, you need to estimate how much your company is likely to expand over the next few years and if possible how many phones you may require.
4 Dazzling Midrange Cell Phones
Your next cell phone can be a stripped down model or contain features virtually unheard of one year ago. Chances are you will select something in between; in any case we are featuring four dazzling midrange flip top cell phones for your examination.
Protective Accessories For Your Cell Phone
Like most electronic devices, cell phones are remarkably fragile. Your cellular phone needs to be protected from water, extreme temperatures, scratches, and unnecessary falls.
The Teen Cellular Phone Market is Growing in Leaps and Bounds
Everywhere you turn around, you see someone talking on a cell phone. This latest technological shift in the way we converse with each other has not been lost on teenagers.
Cell Phone Wallpaper Bonanza
Nowadays teenagers are crazy about personalizing their cell phone and about being able to make the difference. For that, they use different and complicated ringtones, logos, reminders and so on.
Grammy Award Winners Expected to be Heard on Cell Phones Soon
Trends in music come and go, but the crown jewel of musical accomplishment has been a mainstay since its creation. The Grammy Awards are the music industry's biggest night.
Choosing a Voice Mail System
Voice Mail put simply In its simplest form a voice mail system is essentially just another phone answering system. They store their messages on a computer disk.
Camera Cell Phone Picture
Camera cell phone picture - recent development.Camera cell phone picture is a recent development.
How Young is Too Young? Buying Cell Phones for Kids
Take a random tween, age 8-12, place them in front of a rotary phone and observe at the blank stare of bewilderment. Yes, gone are the days of the landline, pushed aside by the next wave of technological advancement.
We Have Compiled a List of Wireless Cell Phones General Cautions and Warnings
For the most part, wireless cell phones are safe. And who could deny the convenience and freedom they have bought to our lives.
Wireless... Are You Connected?
If you look around at any given time in public, you are likely to see people talking on a cellular phone. They are everywhere and growing.
Smart Phones - Are They Really A Smart Decision
First, there was the standard land line phone system; then came the cell phone - a convenient little portable item that everyone adopted a "must have" attitude toward. Progress didn't stop there, however.
Cell Phone Security. How Vulnerable Are You?
There have been significant improvements made recently in cellular phone security. But be careful.
Americans Catching on to Wireless Text Messaging
Once considered a teenage fad, text messaging popularity in the United States is rising dramatically. According to The Wall Street Journal, 4.
Cell Phone Dos and Donts For Teens!
There are certain things people just shouldn't do with cell phones! Like talking in the grocery store line while trying to pay for your groceries, talking in church (like nobody will notice!), talking while driving and eating and talking to the people in the car or talking in the middle of class!Hey - I love my cell phone as much as anybody else, but people are starting to go overboard! You can't have a conversation with a person before their cell phone rings and then they get text messages and then they have to surf the web and then their voice mail goes off because the phone was too busy to receive any actual calls. Come on! Enough is enough.
Choosing a Phone and Voice Mail System
Phone and voice mail systems can be pretty costly, even for companies with a low number of users. Before investing in any type of phone system or voice mail system, you need to estimate how much your company is likely to expand over the next few years.
Spider-man 3 on Your Cellphone Anyone?
The titanic developments in new technology have radically changed the way we watch TV and movies at home. Gone are the days when the TV set was a box in the corner with a 20in screen and a tinny speaker.
Add a Cell Phone Booster to Make Life a Little Easy
Cell Phones have become a mainstay for every earthling. Right from 8 to 80 this has become a part and parcel of every day life.
Indian Mobile Infrastructure - To 3G or Not To 3G
To most overseas investors circa 1994, a first look at the Indian Telecommunication Policy appeared to mitigate concerns. In our naiveté, we expected this Policy to put India at least on par with China where a stifling regime governed telecommunications.
|home | site map|