Cell phones and Personal Digital Assistants (PDAs) have become indispensable tools for todayAis highly mobile workforce. Small and relatively inexpensive, these devices can be used not only for voice calls, simple text messages, and Personal Information Management (PIM), but also for many functions done at a desktop computer. While these devices provide productivity benefits, they also pose new risks. This document is intended to assist organizations in securing cell phones and PDAs. More specifically, this document describes in detail the threats faced by organizations that employ handheld devices and the measures that can be taken to counter those threats.Virus Propagation a In 2005, a mobile phone virus (Commwarrior-B) begin appearing on Symbian Series 60 phones [Law05]. ... Remote Access a A classic Trojan (Brador) targeting Windows Mobile 2003 ARM-based PDA devices creates a file in the ... Mobile spam may also be used fraudulently to persuade users to call or send text messages to chargeable service ... The capability to remotely turn on the microphone and listen or record conversations in the area is also a feature foranbsp;...
|Title||:||Guidelines on Cell Phone and PDA Security|
|Publisher||:||DIANE Publishing - 2009-08|