What the hack, it’s mobilephones now

Wednesday, 22 October 2003, 11:47 AM EST

For computer-hackers and virus-writers, the next frontier in mischief is the cellphone. And the possibilities include a cellphone virus or Trojan horse programme instructing handsets to forward the cellphone-user’s personal address book to others, eating into a cellphone’s operating software and erasing personal information. Fiction? Well, such incidents are already dogging Japan and Europe.

‘‘Mobilephone hacking is a reality. There is every chance of mobilephone hacking having entered India with cases going unreported,’’ says cyber-law expert Pavan Duggal, ‘‘Even as cellphone networks become increasingly sophisticated, there is a simultaneous increase in the number of points within wi-fi networks which can be broken into. India will definitely hear of cellphone-hacking cases by next year.’’

[ Read more ]




Spotlight

The context-aware security lifecycle and the cloud

Posted on 25 November 2014.  |  Ofer Wolf, CEO at Sentrix, explains the role of the context-aware security lifecycle and illustrates how the cloud is shaping the modern security architecture.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Nov 26th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //