Results 1 to 7 of 7
  1.    #1  
    Good reading here from MARA (Mobile Antivirus Researchers Association):

    1. Default WiFi routers
    2. Rogue Access Points
    3. Wireless Zero Configuration
    4. Bluetooth exploits:
    ---BlueTooth DoS attacks:
    5. WEP Weaknesses

    Handheld Mobile Devices (Smartphones and PDAs)

    6. Clear Text Encryption Passwords
    7. Malicious Code
    8. Autorun

    Voice Over IP

    9. Multiple VoIP attacks


    10. Lost and stolen devices
    10 is labeled as the biggest. I just listed the headers....lotsa detail at the site.
  2. #2  
    Good stuff. Thanks for sharing.
    iPhone / Samsung Epix

    Current playtoys:
    Also: Treo 750 (Test phone) / Sony Ericcson w900 (unlocked for international travel)
  3. #3  
    LOL Bluejacking is a vulnerability? It's as malicious as passing a note during study hall!

    I think number 5 should have been number 10. It's ridiculously easy to crack WEP keys.

  4. #4  
    Quote Originally Posted by JackNaylorPE
    10. Lost and stolen devices
    doesnt sprint have a prevention system for stolen phones?

    i saw a commericial about that recently.
    On the road to 5,000 posts
    Life is what happens between Firmware releases.
  5.    #5  
    No, the phone is the "theft deterrent system"....someone tries to take your wallet , you throw the phone at his head.
  6. #6  
    And if they catch it you better hope they don't run away with it.
  7. #7  
    If I throw a large boulder at you and you catch it, will you run away with it?

Posting Permissions