Common mobile viruses:Mobile Security Threat

How they spread and what are the effects: Cabir: When this virus infects  your mobile then  message 'Caribe' will be displayed  at each  time you switch off and  on the mobile. These worms are generally  spread through blue tooth signals from surroundings  mobiles.  Duts: A parasitic  file infector virus .its alos  known as Pocket PC. It try to infect all EXE files which are more than 4kb present in the directory where it saved.  Skulls:  it is a Trojan horse. Means a piece of...

Mobile Security:How you will know your mobile is being tracked??

.HOW IT IS DONEcell phone image by sonya etchison from Fotolia.com  Mobile phones are always being tracked by the cell phone company. And it  is a necessity for provide you the facility to make  and receive phone calls.Mobile service provider can simply pinpoint the location where your mobile is by measuring the strength or weakness of the signal relative to there mobile towers.[sintuhack]. And With the help of  this, you can be traeced  within a few hundred feet. But what if your phone is tarcked by other than your...

Mobile security:Tips for using Bluetooth Securely

All  deficiencies(described in previuos post )  leave a Bluetooth device vulnerable to security threats. Even though security gaps are being filled every day by the manufacturer and technologist, Following are some of the tips that a normal user can keep in mind and protect himself from an amateur BlueTooth  security breacher.[sintuhack] Keep BlueTooth   in the disabled state, enable it only when needed and disable immediately after the intended task is completed.[sintuhack] Keep the device in non-discoverable...

Bluetooth Security Risks:MOBILE SECURITY

Bluetooth Security Risks 1. The first step in using any Bluetooth device is to turn on the Bluetooth feature in it. The default state of Bluetooth in any device is “Off” mode.  2. Once Bluetooth is turned on, it is in active but dormant state. In order to use it, it needs to be put in to “Discoverable” state. In theory when a device is in “non discoverable” state it should not be visible to other devices but in reality the device is still discoverable to those devices it has made a connection before using MAC address. A hacker seeing the...

BLuebugging:Can Breach YOUR Mobile Security

BLuebugging was somewhat like bluesnarfing but the difference is that it is more harmful to your mobile from the prospective of security of your mobile. It was first invented in 2004 by German scientist. In the initial phase, it was necessary to pair devices via Bluetooth before the security breacher  try to breach your mobile with the bugger, but now a days its not needed to pair up the devices.[sintuhack]. It can also possible to break you mobile security via the Bluetooth enabled headset which is used to take call as per to...

Bluesnarfing:Mobile Security Breach

Bluesnarfing refers to a the method in which one has gained access to data, which is stored on a Bluetooth enabled phone of other people. Literally Bluesnarfing can be described as unauthorized access of information from a wireless device through a Bluetooth connection. The level of access depends from case to case, but, in general, it involves pretty much anything that's stored on the user's mobile device.Bluesnarfing allows the using person to make phone calls, send and receive text messages, read and write phonebook contacts,...