Will Cell Phones be Responsible for the Next Internet Worm?

    Date30 Apr 2006
    5945
    Posted ByBrittany Day
    If you have been following the news lately, chances are you are aware of the latest round of cellular phone viruses. Redbrowser , Brador, and Cabir are a few examples of new viruses and worms that compromise so-called "smart phones"—phones that running a handheld operating system such as Palm OS, Symbian, or Microsoft’s Mobile 5—in much the same way as e-mail worms have worked in an increasingly destructive and costly fashion over the past decade. The smart cell phones at the center of this growing problem are just one member of a larger family of mobile computing devices that share the same vulnerability potential. Palm Pilots, Pocket PCs, and RIM devices all share the same wireless data capabilities and provide a significant amount of computing power to boot. You might think, "So what?" It’s just a cell phone, right? Well, that cell phone might just be responsible for the next major Internet worm.

    A worm is a self-contained, self-replicating program that propagates across the Internet by exploiting some known vulnerability. By exploiting the vulnerability, installing itself, and then searching for more computers with the same vulnerability to repeat the process, worms can spread very rapidly if the propagation vulnerability (or vector) is well-chosen. Even worse, some worms can propagate via multiple means (we call this multiple propagation vectors) making the speed and probability of spread much greater. Some of the more famous Internet Worms—costing industry billions of dollars—are LoveBug, Code Red, and Blaster. The good news is that as time goes on, we seem to be getting better at protecting our networks against attack as the perimeter security (firewalls, intrusion detection/prevention) industry matures. With capable perimeter security devices watching the entry points of our networks for malicious activity, the probability of infection is greatly reduced. Until now.

    You are not authorised to post comments.

    LinuxSecurity Poll

    What is your favorite LinuxSecurity.com page/section?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    20
    radio
    [{"id":"73","title":"News","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"74","title":"Advisories ","votes":"4","type":"x","order":"2","pct":80,"resources":[]},{"id":"75","title":"HOWTOs","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"76","title":"Latest Features ","votes":"1","type":"x","order":"4","pct":20,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.