Featured Articles

Intel refreshes CPU roadmap

Intel refreshes CPU roadmap

Intel has revealed an update to its CPU roadmap and some things have changed in 2015 and beyond. Let’s start with the…

More...
Hands on: Nvidia Shield Tablet with Android 5.0

Hands on: Nvidia Shield Tablet with Android 5.0

We broke the news of Nvidia's ambitious gaming tablet plans back in May and now the Shield tablet got a bit…

More...
Nokia N1 Android tablet ships in Q1 2015

Nokia N1 Android tablet ships in Q1 2015

Nokia has announced its first Android tablet and when we say Nokia, we don’t mean Microsoft. The Nokia N1 was designed…

More...
Marvell launches octa-core 64-bit PXA1936

Marvell launches octa-core 64-bit PXA1936

Marvell is better known for its storage controllers, but the company doesn’t want to give up on the smartphone and…

More...
Nvidia GTX 970 SLI tested

Nvidia GTX 970 SLI tested

Nvidia recently released two new graphics cards based on its latest Maxwell GPU architecture, with exceptional performance-per-watt. The Geforce GTX 970…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Wednesday, 15 October 2008 11:36

Researchers expect hackers to prey on mobiles

Written by Nick Farell

Image

My phone is doomed


Hackers are
hatching cunning plans to recruit mobile phones into botnets, according to security experts from Georgia Tech. A new report said that since mobile phones have become a lot more powerful, they are more likely to become recruits for the attacks that have bedeviled PCs.

Georgia Tech said that botnets, or networks of infected or robot PCs, are the weapons of choice when it comes to spam and "denial of service attacks." If mobile phones become absorbed in botnets, new types of moneymaking scams could be born. For example, infected phones could be programmed to call pay-per-minute 1-900 numbers or to buy ringtones from companies set up by the criminals.

A big appeal of cell phones for hackers is that the devices are generally always on, they're sending and receiving more data, and have poor security. Any antivirus software would suck up massive amounts of battery life, which is a killer on a mobile device. Once hackers learn how the mobile networks work and adapt their attacks then mobile phones could be wide open.

The only thing that is stopping them is mobile phone operators have tighter control over their networks, which means they could shut down the lines of communication between infected phones much easier.
Last modified on Thursday, 16 October 2008 03:36

Nick Farell

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments