Once i heard ki "Jeene k liye sirf teen cheezo ki jaroorat hai roti ,kapda aur makan ".
Does the above quote stil holds true ? Many people dont think so atleast not
me.The new addition is the mobile phones.It is not same as for it was
invented.Today talking is just a 1 in a million task which we do with our phones.SMS,MMS,banking,E-mail,Push-mail,Shopping etc are others.
Mobile phones have evolved a lot and today it has taken the shape of a
computer with small memory,small processors,small power supply ,and many more
small things but what about the security?
I personally don't think that the security related with these device is that
small as the device itself is.
How many of us have put password in our phone or used any encrypting tool for
our memory cards or an any application that provide some counter measures.The
answer to these question is very few in numbers.
In my these post i would like to list some of these issues.
Please note that the vulnerability associated with this devices are numerous
and also it is not possible to explain each of them so i will list only some
major and common issues..
1.MEMORY CARDS
Today the cheapest phone in the market do have a memory card .
Many a times it happens we just cry " My card had bee the data w one." just concerned with
the money but not about the personnel information.
Remember after for mating also your data is not safe. If i can recreate those files from a for mated card then smart and intelligent crackers certainly misuse your data.
2.IPHONE
I phones are the great plate form for the mobile phone hackers android being in
the second rank.
Security risk can be seen from the rule of UK government which harshly strict
UK government ministers using i phone when GCHQ refused to pass the device
safe for official business.
There is a jailbreak application for i-phone which allows user to install any
application on their phone and later converts it into a " Weaponised " form
which can crack on to a phone when user clicks on a link online.
however risk has been reduced by apple initiatives which allows only those
application to install which has been listed in App Store.
3.ANDROID PHONE
A very high cost cyber attack has not yet been identified but a security
professional of united kingdom has found that a malicious website has the
capacity to read the contents of the files stored on the androids device.
Smart phones which is using goggles Android OS , a customised version of Linux
does not have a hardware encryption and has a lot of features to make them
vulnerable to to days security risks.
Installing applications in android does not ask for any signature or something
like that.
How ever each application ask before accessing device file system , device
data or network....
5.Black Berry's(Luxury Icon)
The government of India already put high pressure on reliance India mobile
company for encrypted data access last year but it might not have born
fruit,however a pair of developers of Russia are attempting to crack the phone
having a password.
Black berry have offline data backup mechanism and can be easily cracked its 7
digit password in not more than 7 days and hardly few more days if it
contains a special symbols or numbers.
however ,transmission of data between BES(blackberry enterprise server) and
the phone is encrypted with secure AES or triple DES algorithm.
6.SYMBIAN
This is an operating system developed in a joint venture of nokia and Sony
Ericsson's mobile phones and a highly distributed mobile OS in the world.
A service known as Bucktooth made the networking of this mobile devices very
easy but has compromised with security.
Blue snarfing and Blue bugging is a common threat to this.
Blue snarfing give UN authorised access to mobile data.
Blue bugging is type of mobile phone attack where attacker can easily trace
and listen calls made from the phone.It was originally targeted for laptops but
as advancement hack increased it has compromised PD A's and Smart Phones too.
7.SIM CARDS
Sim card if lost can be used to make suspicious call to strangers .
in most adverse condition it can be use to connect to some malicious web
activity with your identification as saved in mobile phone company database.
Using social networking and general email checking using public WI-FI hot spot
is most insecure activity any one can do.
Even a nubile in hacking can easily sniff all the details with user name s
,passwords and private chatting logs.
So Friends the above is a list of some basic security threats related with
to days mobile phones....
In my next article i would list some of the best countermeasures to how to
protect this security holes and i will also list some of the software which u
can use as a counter measures.
so don't miss out my next article "SAFE GUARDING MOBILE PHONES FROM PRYING
EYES.....". Till then explore your phone to a maximum........
As i always say pls do comments......
JITENDRA KUMAR PATEL.
http://www.facebook.com/bewithjitendrapatel
No comments:
Post a Comment
PLS GIVE ME UR COMMENTS IT IS VERY MUCH IMPORTANT FOR ME.