Feeds

Era of picking your own PDA draws to a close

Security concerns force firms to standardise

  • alert
  • submit to reddit

High performance access to file storage

Firms may soon mandate the use of particular handheld devices and mobile phones in order to establish some kind of control over security risks.

That's the view Symantec's director of wireless strategy, Jason Conyard, who is encouraging firms to develop security policies to combat mobile security threats such as hacking into wireless networks and next-generation malicious code.

Conyard isn't suggesting a particular platform (Symbian, Palm OS, Pocket PC) for firms to use. He said standardising on the same device and configuration to limit both support costs, and manage security exposure, is more important that what the device a firm might pick.

Symantec is under no illusions that implementing a mobile security policy will be easy.

Users are used to choosing their own mobile device based on what they consider "cool and sexy" and a change in culture to use of uniform corporate issue kit is unlikely to go down well. Low adoption of current security standards (often "too complicated" according to Conyard) is another issue. Tools for managing the application and configuration of mobile devices are "very basic", Symantec admits, which hardly helps.

Enterprises (or service providers) run the risk of running foul of the Data Protection Act if they don't access due care over customer data, which might be exposed by flaky wireless security, so Symantec is right that the issue can't be simply ignored.

Wireless LANs can be secured by measures such as only allowing access over a VPN and restricting use to authorised devices but anecdotal evidence suggests 802.11b networks are often put up which are wide open to drive-by hacking.

This is only the start of the problems that Symantec outlined in a threat timeline for us today. Threats we take as serious include DoS attacks on mobile networks in 2002, location based spam (late 2002) and hacking attacks on GPRS networks in 2003. Very nasty.

We're far less convinced about the emergence of mobile viruses on next-generation phones, in part because the anti-vendors like Symantec have such a vested interest in hyping this one up.

It remains unproven whether Symbian or even Stinger-based devices will be particularly susceptible to mobile viruses even as they become more common-place and therefore a more attractive target to s'kiddies. The basic PDA viruses we've seen so far have not convinced us that we'll see wireless worms along the lines of the Anna Kournikova virus by 2003, as Symantec suggests.

If mobile phones ever come with Word macros or potentially infectious mobile attachments things will change but, for now, the threat remains unproven. ®

Related Stories

Rogue WLANS - the next security battlefield?
Secure the Wireless Network firmware
War driving - the latest hacker fad

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.