Cell Phone Viruses & Security

4,824
-1

Published on

Published in: Economy & Finance, Technology
1 Comment
3 Likes
Statistics
Notes
No Downloads
Views
Total Views
4,824
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
1
Likes
3
Embeds 0
No embeds

No notes for slide

Cell Phone Viruses & Security

  1. 1. What is the common communication medium among us??????? CELL PHONE VIRUSES & SECURITY
  2. 2. <ul><li>A Cell Phone </li></ul>CELL PHONE VIRUSES & SECURITY
  3. 3. Cell phone Viruses and Security <ul><ul><li>1 </li></ul></ul>
  4. 4. Outline <ul><li>The technology of cell phones </li></ul><ul><li>Viruses </li></ul><ul><li>How Cell phone viruses work </li></ul><ul><li>Difference with PC virus </li></ul><ul><li>Different Types Of Cell Phone Viruses </li></ul><ul><li>Security Issue </li></ul>CELL PHONE VIRUSES & SECURITY
  5. 5. The technology of cell phones (NETWORK) <ul><li>Analog networks </li></ul><ul><li>Digital networks </li></ul>
  6. 6. Analog networks <ul><li>Today all providers have switched to digital networks and only a few of them are still running analog networks. </li></ul>CELL PHONE VIRUSES & SECURITY
  7. 7. Digital networks <ul><li>FDMA ( Frequency division multiple access ) </li></ul><ul><li>CDMA (Code-Division Multiple Access) </li></ul><ul><li>TDMA (Time Division Multiple Access) </li></ul><ul><li>GSM (Global System for Mobile communication) </li></ul>CELL PHONE VIRUSES & SECURITY
  8. 8. FDMA CELL PHONE VIRUSES & SECURITY In FDMA, each phone uses a different frequency.
  9. 9. CDMA CELL PHONE VIRUSES & SECURITY In CDMA, each phone's data has a unique code
  10. 10. TDMA CELL PHONE VIRUSES & SECURITY TDMA splits a frequency into time slots .
  11. 11. GSM CELL PHONE VIRUSES & SECURITY
  12. 12. GSM <ul><li>Subscriber Identity Module </li></ul><ul><li>Some operators will block this by allowing the phone to use only a single SIM </li></ul><ul><li>The locking applies to the handset, identified by its International Mobile Equipment Identity (IMEI) number, not to the account </li></ul>CELL PHONE VIRUSES & SECURITY
  13. 13. viruses <ul><li>Cell phone viruses are electronic programs that attacks cell phones and PDA (personal digital assistants) devices & malfunction s/w that are running cell phones. </li></ul><ul><li>HOW THE SPREAD </li></ul><ul><li>Internet downloads </li></ul><ul><li>Bluetooth wireless connection </li></ul><ul><li>Multimedia Messaging Service </li></ul>CELL PHONE VIRUSES & SECURITY
  14. 14. Threats by Cell Phone malware <ul><li>For financial gain / loss </li></ul><ul><ul><ul><li>Unnecessary calls / SMS / MMS </li></ul></ul></ul><ul><ul><ul><li>Send and sell private information </li></ul></ul></ul><ul><li>Cause phones to work slowly or crash </li></ul><ul><li>Wipe out contact books and other information on the phone </li></ul><ul><li>Remote control of the phone </li></ul><ul><li>Install “false” applications </li></ul>CELL PHONE VIRUSES & SECURITY
  15. 15. Differences with PC <ul><li>Although similar OSes are being used, differences exist: </li></ul><ul><ul><li>Lesser users of Cell Phones are “tech literate” </li></ul></ul><ul><ul><li>Implies that it is difficult to “rollout security patches” to phones already sold </li></ul></ul><ul><ul><li>Cell Phones are always “connected” and switched on </li></ul></ul><ul><ul><li>“ Environment” keeps changing </li></ul></ul><ul><ul><ul><li>Imagine one infected phone in a stadium full of people </li></ul></ul></ul>CELL PHONE VIRUSES & SECURITY
  16. 16. Differences... <ul><li>On the positive side: </li></ul><ul><ul><li>Several variants of phones exist </li></ul></ul><ul><ul><ul><li>A malware for one type of phone may not necessarily be able to infect others </li></ul></ul></ul><ul><ul><ul><ul><li>E.g., A virus that uses an MMS exploit cannot infect a phone that does not have that facility at all </li></ul></ul></ul></ul><ul><ul><li>Cell Phone malware not yet causing critical harm </li></ul></ul><ul><ul><ul><li>At most </li></ul></ul></ul><ul><ul><ul><ul><li>they increase the user's billing, or </li></ul></ul></ul></ul><ul><ul><ul><ul><li>cause the Cell Phone phone to stop working (can be restored by a factory reset) </li></ul></ul></ul></ul>CELL PHONE VIRUSES & SECURITY
  17. 17. Different types of known Cell Phones Viruses <ul><li>Timifonica </li></ul><ul><li>Cabir </li></ul><ul><li>Commwarrior </li></ul><ul><li>Comwar </li></ul><ul><li>Duts </li></ul><ul><li>Skulls </li></ul><ul><li>Lasco.A </li></ul>CELL PHONE VIRUSES & SECURITY
  18. 18. Case study - Timifonica <ul><li>This virus was reported in 2000. </li></ul><ul><li>This was one of the first viruses that forced infected PCs to send text messages to phones. </li></ul><ul><li>the worm has not affected mobile users yet. It was just theoretical threat. </li></ul>CELL PHONE VIRUSES & SECURITY
  19. 19. Case Study – CABIR <ul><li>First Cell Phone worm </li></ul><ul><li>Spread vector – Bluetooth </li></ul><ul><li>Infected file – caribe.sis </li></ul><ul><li>15 new variants exist </li></ul>CELL PHONE VIRUSES & SECURITY
  20. 20. Case Study – Commwarrior <ul><li>Reported in March 2005. </li></ul><ul><li>It infects mainly phones running Symbian OS </li></ul><ul><li>The worm replicates itself through the phone's Multimedia Messaging System (MMS) </li></ul><ul><li>Spread through Bluetooth </li></ul><ul><li>Commwarrior also read the user's local address book for phone numbers and will then start sending MMS messages containing Commwarrior. </li></ul>CELL PHONE VIRUSES & SECURITY
  21. 21. Case Study - ComWar <ul><li>Second landmark in Cell Phone worms </li></ul><ul><li>Spread vector - Bluetooth and MMS </li></ul><ul><li>Large spread area due to MMS </li></ul><ul><li>Not as proof of concept – Intention to harm by charging the Cell Phone user </li></ul><ul><li>Multiple variants detected </li></ul>CELL PHONE VIRUSES & SECURITY
  22. 22. Case Study - Duts <ul><ul><li>It is the first known virus to infect cell phones and PC as well </li></ul></ul><ul><ul><li>Case Study- skull </li></ul></ul><ul><ul><li>The Skulls virus replaces all phone desktop icons with images of a skull. </li></ul></ul><ul><ul><li>MMS & SMS will no longer be usable </li></ul></ul>CELL PHONE VIRUSES & SECURITY
  23. 23. Case Study lasco.A <ul><li>The Lasco.A is activated when cell phone user clicks on the file and installs it </li></ul><ul><li>It spread same as above mentioned viruses </li></ul><ul><li>This Symbian malware was common for PCs, but now it is present in cell systems too </li></ul>CELL PHONE VIRUSES & SECURITY
  24. 24. Futuristic Threats <ul><li>Location Tracking </li></ul><ul><li>Camera and Microphone Bug </li></ul><ul><li>Leaking Sensitive Information </li></ul><ul><li>attack on Cell Phone Service Provider </li></ul>CELL PHONE VIRUSES & SECURITY
  25. 25. The generic security isuues…
  26. 26. Security Issues........... <ul><li>The best way to protect yourself from cell-phone viruses is the same way you protect yourself from computer viruses </li></ul><ul><li>Never open anything if you don't know what it is…. </li></ul>CELL PHONE VIRUSES & SECURITY
  27. 27. Security Issues........ <ul><li>Turn off Bluetooth discoverable mode </li></ul><ul><li>Keep you cellphone in “hidden” mode </li></ul>CELL PHONE VIRUSES & SECURITY
  28. 28. Security Issues......... <ul><li>Check security updates to learn about filenames you should keep an eye out for. </li></ul><ul><li>E.g.:-the Commwarrior program generates random names for the infected files it sends out, so users can't be warned not to open specific filenames </li></ul><ul><li>Security sites with detailed virus information include: </li></ul><ul><ul><li>F-Secure </li></ul></ul><ul><ul><li>McAfee </li></ul></ul><ul><ul><li>Symantec </li></ul></ul>CELL PHONE VIRUSES & SECURITY
  29. 29. Security Issues......... <ul><li>Install some type of security software on your phone </li></ul><ul><li>anti viruses can be downloaded from genuine sites like: </li></ul><ul><li>F-secure </li></ul><ul><li>Mac-afee </li></ul><ul><li>kaspersky </li></ul>CELL PHONE VIRUSES & SECURITY
  30. 30. <ul><li>Questions?? </li></ul>CELL PHONE VIRUSES & SECURITY
  31. 31. DON’T BE OVER CONCIOUS!! CELL PHONE VIRUSES & SECURITY
  32. 32. Thank You!!

×