contact contact contact
  Articles | Editorials | Reviews | InfoSec Directory | News | Press Releases
Trojan horse causes mobile phone crash
Author: IT-Observer Staff
Thursday, 07 April 2005, 11:27 GMT
Reader Comments | Add your opinion

A new Trojan horse that causes smart-phones to crash was reported by the security software maker F-Secure on Wednesday.

The Trojan horse, Fontal.A, attacks Nokia 60 Series running the Symbian operating system and makes the phones useless until they are reformatted.

Fontal.A tries to install a corrupted file, called "Kill Saddam By OID500.sis," into the infected device, causing it to fail at the next reboot, according to F-Secure advisory. If the phone is rebooted, it will try to boot, but does not succeed. After that the phone is unusable.

To avoid Fontal.A, F-Secure suggest that user should download files only from trusted sources, as far as the only way to disinfect the phone is to reformat the phone.

While this is further evidence of a growing concentration of attention on the mobile phone by virus writers there is little sign of any infection in wild.

Add IT Observer News to your RSS newsreader or



Reader Comments:

No comments. Post your comment here

InfoSec Directory
» Bluetooth Security Tools
» Windows/Linux Security - Web Server Role
» Anti-Spyware Software: Securing the Corporate Network
» Using Digital Signatures to Secure Email and Stop Phishing Attacks
» Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues
Latest Press Releases
» GunnAllen Financial Switches to FrontBridge to Ease Message Archiving Processes
» "Mastering FreeBSD and OpenBSD Security": Building, Securing, and Maintaining BSD Systems
» Secured Services and Allegent Technology Group Announce Bristol West Deployment of Network Security Platform
» Netframeworks announces the availability of its SafeSpaceSoftware suite of products and services
» CP-Lab Releases Password Manager XP
» eEye Digital Security Announces Availability of Protection For April Microsoft Security Vulnerabilities
More Articles
» VoIP – What’s the Real Opportunity for Small Businesses?
» Run Your IT Department Like a Business! What?
» Zombie Computers
» HTTP Response Splitting
» An IT Manager’s Insight into Securing Removable Media
 Copyright © 2000 - 2005 eBCVG IT Security Affiliates :: RSS feeds :: Privacy 
Site Meter