Tuesday, February 15, 2011

Vulnerabilities of Smartphones


Recent security studies on smartphones have revealed a host of vulnerabilities associated with their usage. In fact, with Internet compatibility, cases of trojanised smartphones will increase and smartphones risk potentially becoming an even bigger target for hackers than computers.

Smartphones built on “open” programming platforms and operating systems (OS) fundamentally designed to accept applications (apps) have also resulted in a trade-off on the level of control over what these apps are doing in the background. Many apps available nowadays can even operate below or at the OS level rendering them almost "invisible" to the users. These include the likes of tracking and surveillance apps which infringe our privacy and pose security threats. "Utilities" that are able to perform lower level functionalities with dubious modular programming codes can also be integrated into "free apps" without the users' knowledge.
Whilst recording devices are not carried into meetings, these smartphones are! Trojanised smartphones, when remotely activated without the knowledge of the user, can potentially compromise all conversations in the vicinity of the device. Accidental auto dials or enabling auto-answer can inadvertently breach security during classified meetings/discussions. Built-in GPS capabilities can track movement, coupled with information aggregation, can potentially result in a compromise of locations and operations. Common to all mobile phones, any loss, theft or seizure of smartphones will likewise result in a compromise of important information such as, official contacts, schedules, text messages etc. residing within.


No comments:

Post a Comment