You are here: IT-Observer È News RSS | White Papers |

Bluetooth vulnerability invites mobile worm




For the past year, mobile phone vendors have been trying to fix several Bluetooth security vulnerabilities that could allow hackers to create an MSBlast-type worm that spreads from handset to handset without any user intervention.

Bluetooth has suffered a number of security alerts over the past year ranging from the relatively harmless to the incredibly serious. The first known Bluetooth vulnerability was the Cabir worm, which was discovered a month ago. The security problems do not seem to stem from the Bluetooth standard itself, but rather the way in which handset manufacturers have implemented the technology.

Mikko Hyppönen, director of antivirus research at Finnish firm F-Secure, said an MSBlast or Sasser-style worm spreading between Bluetooth devices becomes possible if handsets can be made to accept and execute a file without first asking the user for permission.

Read Full Story

Prevent data theft & viruses through network connected USB sticks, PDAs & media players. Control user access to endpoint connections with GFI EndPointSecurity - Free trial!

Visit GFI Security Software page for more information.

IT-Gear.com - Weblog dedicated to everything concerning IT tools and services.

Latest News

SECUDE appoints Open-Source specialist as Linux Expert
02.11.06ÊÊSECUDE IT Security GmbH has confirmed the appointment of Felipe Rodriguez, a Linux Kernel contributor and owner of the Open-Source project MGSTEP, as its Linux Expert.

Increased Spam Fuelled Through Botnet Activities
02.11.06ÊÊMessageLabs, a provider of integrated messaging and web security services to businesses worldwide, has announced the results of its Intelligence Report for October 2006.

How to keep your VoIP net safe
30.10.06ÊÊOne of the major challenges in implementing a converged network is having a coherent security policy for the management and control of a system that is carrying voice, video and data.

User tricks, security treats
30.10.06ÊÊThirteen malevolent spirits may haunt the halls and cubicles of your company, and if you're going to scare them into security compliance you may need to get a little bit spooky yourself.

10 Steps to More Secure Wireless
27.10.06ÊÊWe have all heard about the stories of spammers using open home wireless networks to fill the net with junk mail.

BT acquires Counterpane Internet Security
25.10.06ÊÊBT has announced that it has acquired Counterpane Internet Security, a provider of managed networked security services, as part of its strategy to expand and develop its global professional services capabilities.

Perdemia updates Permission Analyzer
25.10.06ÊÊPerdemia has upgraded Permission Analyzer, a powerful Windows administration tool that quickly determines whether the system access permissions are properly set, need to be changed, or have been altered by people who are not authorized to make changes.

Mac OS Bluetooth exploit - Inqtana.d
25.10.06ÊÊInqtanad is a proof-of-concept exploit, which has not yet been seen in the wild, that is installed on a Mac OS X computer via Bluetooth from a computer or PDA running a Linux system.

Copyright © IT-Observer Online Publication 2000 - 2006 Top | RSS Feeds | About Us
Site Meter