Feeds

Era of picking your own PDA draws to a close

Security concerns force firms to standardise

  • alert
  • submit to reddit

Top three mobile application threats

Firms may soon mandate the use of particular handheld devices and mobile phones in order to establish some kind of control over security risks.

That's the view Symantec's director of wireless strategy, Jason Conyard, who is encouraging firms to develop security policies to combat mobile security threats such as hacking into wireless networks and next-generation malicious code.

Conyard isn't suggesting a particular platform (Symbian, Palm OS, Pocket PC) for firms to use. He said standardising on the same device and configuration to limit both support costs, and manage security exposure, is more important that what the device a firm might pick.

Symantec is under no illusions that implementing a mobile security policy will be easy.

Users are used to choosing their own mobile device based on what they consider "cool and sexy" and a change in culture to use of uniform corporate issue kit is unlikely to go down well. Low adoption of current security standards (often "too complicated" according to Conyard) is another issue. Tools for managing the application and configuration of mobile devices are "very basic", Symantec admits, which hardly helps.

Enterprises (or service providers) run the risk of running foul of the Data Protection Act if they don't access due care over customer data, which might be exposed by flaky wireless security, so Symantec is right that the issue can't be simply ignored.

Wireless LANs can be secured by measures such as only allowing access over a VPN and restricting use to authorised devices but anecdotal evidence suggests 802.11b networks are often put up which are wide open to drive-by hacking.

This is only the start of the problems that Symantec outlined in a threat timeline for us today. Threats we take as serious include DoS attacks on mobile networks in 2002, location based spam (late 2002) and hacking attacks on GPRS networks in 2003. Very nasty.

We're far less convinced about the emergence of mobile viruses on next-generation phones, in part because the anti-vendors like Symantec have such a vested interest in hyping this one up.

It remains unproven whether Symbian or even Stinger-based devices will be particularly susceptible to mobile viruses even as they become more common-place and therefore a more attractive target to s'kiddies. The basic PDA viruses we've seen so far have not convinced us that we'll see wireless worms along the lines of the Anna Kournikova virus by 2003, as Symantec suggests.

If mobile phones ever come with Word macros or potentially infectious mobile attachments things will change but, for now, the threat remains unproven. ®

Related Stories

Rogue WLANS - the next security battlefield?
Secure the Wireless Network firmware
War driving - the latest hacker fad

Combat fraud and increase customer satisfaction

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Canadian taxman says hundreds pierced by Heartbleed SSL skewer
900 social insurance numbers nicked, says revenue watchman
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
Burnt out on patches this month? Oracle's got 104 MORE fixes for you
Mass patch for issues across its software catalog
Reddit users discover iOS malware threat
'Unflod Baby Panda' looks to snatch Apple IDs
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.