Chapter 9. Exploiting Cell Phones

The previous chapter discussed the threats to PDAs. While it's true that “smart phones” can have Palm or Windows operating systems running on them, “non‐smart” phones are pretty smart themselves. Today's typical cell phones can

  • Store a considerable amount of contact information

  • Surf the Internet

  • Send and receive email

  • Play music

  • Wirelessly interact with other pieces of hardware

  • Play games

  • Capture video and pictures

While all of these features increase efficiency, enhance user experience, and are pretty cool, they open up a number of security concerns. In large part, this is because the operating systems on cell phones are becoming more complex, meaning there is more that can be exploited.

Cell‐Phone Malware

Some people don't understand that cell‐phone malware actually exists. In reality, there is a quite a bit of it. Some sources say more than 300 pieces of mobile malware are out in the wild today. That's a big number and the threat needs to be taken seriously.

As stated in Chapter 2, “Understanding the Devices,” many cell phones utilize the Symbian operating systems. Because of this, there is a great deal of malware for Symbian OS–based phones. Fortunately, a number of companies have security solutions for Symbian‐based phones. Nonetheless, many enterprises simply do not have the proper solutions in place. That needs to change.

Get Blackjacking now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.