-->

Time.....

ALL ABOUT SINGRAULLLI.......

RECENTLY ADDED PHOTOS......

PLS DONT COPY............

Protected by Copyscape Online Plagiarism Tool

Wednesday, January 19, 2011

Security Risk Associated With Mobile Phones.........

Once i heard ki "Jeene k liye sirf teen cheezo ki jaroorat hai roti ,kapda aur makan ".


Does the above quote stil holds true ? Many people dont think so atleast not 


me.The new addition is the mobile phones.It is not same as for it was 


invented.Today talking is just a 1 in a million task which we do with our phones.SMS,MMS,banking,E-mail,Push-mail,Shopping etc are others.


Mobile phones have evolved a lot and today it has taken the shape of a 
computer with small memory,small processors,small power supply ,and many more 
small things but what about the security?


I personally don't think that the security related with these device is that 
small as the device itself is.


How many of us have put password in our phone or used any encrypting tool for 
our memory cards or an any application that provide some counter measures.The 
answer to these question is very few in numbers.


In my these post i would like to list some of these issues.
Please note that the vulnerability associated with this devices are numerous 
and also it is not possible to explain each of them so i will list only some 
major and common issues..


1.MEMORY CARDS


Today the cheapest phone in the market do have a memory card . 
Many a times it happens we just cry " My card had bee the data w one." just concerned with 
the money but not about the personnel information.


Remember after for mating also your data is not safe. If i can recreate those files from a for mated card then smart and intelligent crackers certainly misuse your data.


2.IPHONE


I phones are the great plate form for the mobile phone hackers android being in 
the second rank.
Security risk can be seen from the rule of UK government which harshly strict 
UK government ministers using i phone when GCHQ refused to pass the device 
safe for official business.


There is a jailbreak application for i-phone which allows user to install any 
application on their phone and later converts it into a  " Weaponised " form 
which can crack on to a phone when user clicks on a link online.
however risk has been reduced by apple initiatives which allows only those 
application to install which has been listed in App Store.


3.ANDROID PHONE


A very high cost cyber attack has not yet been identified but a security 
professional of united kingdom has found that a malicious website has the 
capacity to read the contents of the files stored on the androids device.


Smart phones which is using goggles Android OS , a customised version of Linux  
does not have a hardware encryption and has a lot of features to make them 
vulnerable to to days security risks.


Installing applications in android does not ask for any signature or something 
like that.


How ever each application ask before accessing device file system , device 
data or network....


5.Black Berry's(Luxury Icon)


The government of India already put high pressure on reliance India mobile 
company for encrypted data access last year but it might not have born 
fruit,however a pair of developers of Russia are attempting to crack the phone 
having a password.


Black berry have offline data backup mechanism and can be easily cracked its 7 
digit  password in not more than 7 days and hardly few more days if it 
contains a special symbols or numbers.
however ,transmission of data between BES(blackberry enterprise server) and 
the phone is encrypted with secure AES or triple DES algorithm.




6.SYMBIAN


This is an operating system developed in a joint venture of nokia and Sony 
Ericsson's mobile phones and a highly distributed mobile OS in the world.


A service known as Bucktooth made the networking of this mobile devices very 
easy but has compromised with security.


Blue snarfing and Blue bugging is a common threat to this.


Blue snarfing give UN authorised access to mobile data.


Blue bugging is type of mobile phone attack where attacker can easily trace 
and listen calls made from the phone.It was originally targeted for laptops but 
as advancement hack increased it has compromised PD A's and Smart Phones too.




7.SIM CARDS 


Sim card if lost can be used to make suspicious call to strangers .
in most adverse condition it can be use to connect to some malicious web 
activity with your identification as saved in mobile phone company database.


Using social networking and general email checking using public WI-FI hot spot  
is most insecure activity any one can do.


Even a nubile in hacking can easily sniff all the details with user name s 
,passwords and  private chatting logs.


So Friends the above is a list of some basic security threats related with 
to days mobile phones....




In my next article i would list some of the best countermeasures to how to 
protect this security holes and i will also list some of the software which u 
can use as a counter measures.
so don't miss out my next article "SAFE GUARDING MOBILE PHONES FROM PRYING 


EYES.....". Till then explore your phone to a maximum........


As i always say pls do comments......


JITENDRA KUMAR PATEL.
http://www.facebook.com/bewithjitendrapatel

No comments:

Post a Comment

PLS GIVE ME UR COMMENTS IT IS VERY MUCH IMPORTANT FOR ME.

SEARCH BLOG

INDORAMA { BUNKERS OF L.K.C.T. }

Followers