Cell Phone Security
description
Transcript of Cell Phone Security
Cell Phone Security
By Paul Capers
What is a Cell Phone?
A cell phone is a portable telephone that does not use a wired connection. It connects to a wireless carrier network using radio waves
The ability to communicate over cellular networks distinguishes it self from other types of handheld devices.
Cellular Communications
Cell Phones communicate through the air by radio waves with a base station
Cellular networks provide coverage based on dividing a large geographical service area into smaller areas of coverage called cells.
Cells play an important role in reuse of radio frequencies in the limited radio spectrum available to allow more calls to occur than otherwise would be possible.
Importance of a Cell Phone The importance of having a cell
phone in this day in age is valuable to our lives. It has become a necessity for many people in today’s society. Giving the ability to keep in touch with family, business associates, and having the capability of sending email are only a few of the reasons for the ever-increasing importance of cell phones.
Cell Phone Capabilities
Text messaging GPS Music Sound &Video
recording Sending /Receiving
Pictures Microsoft office
applications Camera/camcorder
Games Bluetooth Wi-Fi connectivity Instant messaging Surfing the web E-mail and a range of
other things of that sort.
Security a MUST have!!
Even though a cell phone presents great features and capabilities, these phones need security.
Cell phones is nothing less than a simplified computer
Security a Must have!!
Personal/ Business Use Prevent others from listening to your
private conversations Protect sensitive financial information Protect Emails/Calender/address book Prevent fraudulent billing
Cell Phone Viruses
The first known cell-phone virus appeared in 2004 called Cabir.A—it affected only a small number of Bluetooth-enabled phones.
Common Viruses today Cabir.A Skulls.A
Commwarrior.A Locknut.B Fontal.A
Viruses
Results From a Virus It will spread throughout the phone. Access and/or delete contact information
and calendar entries Send an infected SMS/MMS messages to
every number in your phone book Send costly messages/calls Kill your batteryThe Point is, cell phone viruses are here
and will only grow in popularity
Cell Phone Vulnerabilities
Stolen/Lost VoIp
Bluetooth Eavesdropping
Stolen/Lost Cell Phones are small. One of the reasons
why they are so popular. On the other hand, small things have a way of getting lost or stolen.
HOW MANY PEOPLE LOST THERE PHONE BEFORE?
It is highly recommended that you lock your phone with a password. The finder of the phone may have your device, but at least they won’t have your personal information or be able to use your device.
VoIP
Voice over IP is a growing occurrence, as are its security problems. With a little time and a solid understanding of a VoIP system, it can be easy to target phone systems and trick them into passing fake information. This could be as simple as changing the caller ID number listed with the phone call, or as dangerous as being able to bypass security checks and accessing a mobile phone users account
Bluetooth Bluetooth is a wireless technology that allows
local devices to generate a small network through which information can be passed. This information usually consists of addresses and small files. Bluetooth settings must be correctly applied. If the settings are not applied correctly, an attacker can gain access to your call history, address book, calendar entries, and much more.
To avoid such problems you should simply disable your bluetooth when not in use.
Eavesdropping
At one point in time eavesdropping was a big problem for analog phone users. Due to the fact that FM radio signals were easily monitored using scanners.
The majority of cell phones today are digital.
Therefore they are less vulnerable to eavesdropping.
Celebrity Victims
Paris Hilton: hackers gained access to her sidekick and downloaded all of her stored video, text and data files and posted her address book on the Internet.
Celebrity Victims President Barack Obama
Cyber terrorist Kasper Hauser has accessed President Barack Obama's encrypted Blackberry messages
Obama's Blackberry contained sensitive messages from the Commander in Chief to Vice President Joe Biden, Secretary of State Hillary Clinton, California Governor Arnold Schwarzenegger - even Nuclear Command Control itself.
Celebrity Victims
kardashinavideo.html
Protecting Your Phone Turn off Bluetooth discoverable mode Check Security Updates Use a mobile anti-virus program
NetQuin(Droid) LookOut Mobile Security(Droid) F-Secure McAfee SymantecLock Phone with passwordHave a voicemail passwordFrequently change your password
The End