Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cell Phone Viruses & Security


Published on

Published in: Economy & Finance, Technology

Cell Phone Viruses & Security

  1. 1. What is the common communication medium among us??????? CELL PHONE VIRUSES & SECURITY
  2. 2. <ul><li>A Cell Phone </li></ul>CELL PHONE VIRUSES & SECURITY
  3. 3. Cell phone Viruses and Security <ul><ul><li>1 </li></ul></ul>
  4. 4. Outline <ul><li>The technology of cell phones </li></ul><ul><li>Viruses </li></ul><ul><li>How Cell phone viruses work </li></ul><ul><li>Difference with PC virus </li></ul><ul><li>Different Types Of Cell Phone Viruses </li></ul><ul><li>Security Issue </li></ul>CELL PHONE VIRUSES & SECURITY
  5. 5. The technology of cell phones (NETWORK) <ul><li>Analog networks </li></ul><ul><li>Digital networks </li></ul>
  6. 6. Analog networks <ul><li>Today all providers have switched to digital networks and only a few of them are still running analog networks. </li></ul>CELL PHONE VIRUSES & SECURITY
  7. 7. Digital networks <ul><li>FDMA ( Frequency division multiple access ) </li></ul><ul><li>CDMA (Code-Division Multiple Access) </li></ul><ul><li>TDMA (Time Division Multiple Access) </li></ul><ul><li>GSM (Global System for Mobile communication) </li></ul>CELL PHONE VIRUSES & SECURITY
  8. 8. FDMA CELL PHONE VIRUSES & SECURITY In FDMA, each phone uses a different frequency.
  9. 9. CDMA CELL PHONE VIRUSES & SECURITY In CDMA, each phone's data has a unique code
  10. 10. TDMA CELL PHONE VIRUSES & SECURITY TDMA splits a frequency into time slots .
  12. 12. GSM <ul><li>Subscriber Identity Module </li></ul><ul><li>Some operators will block this by allowing the phone to use only a single SIM </li></ul><ul><li>The locking applies to the handset, identified by its International Mobile Equipment Identity (IMEI) number, not to the account </li></ul>CELL PHONE VIRUSES & SECURITY
  13. 13. viruses <ul><li>Cell phone viruses are electronic programs that attacks cell phones and PDA (personal digital assistants) devices & malfunction s/w that are running cell phones. </li></ul><ul><li>HOW THE SPREAD </li></ul><ul><li>Internet downloads </li></ul><ul><li>Bluetooth wireless connection </li></ul><ul><li>Multimedia Messaging Service </li></ul>CELL PHONE VIRUSES & SECURITY
  14. 14. Threats by Cell Phone malware <ul><li>For financial gain / loss </li></ul><ul><ul><ul><li>Unnecessary calls / SMS / MMS </li></ul></ul></ul><ul><ul><ul><li>Send and sell private information </li></ul></ul></ul><ul><li>Cause phones to work slowly or crash </li></ul><ul><li>Wipe out contact books and other information on the phone </li></ul><ul><li>Remote control of the phone </li></ul><ul><li>Install “false” applications </li></ul>CELL PHONE VIRUSES & SECURITY
  15. 15. Differences with PC <ul><li>Although similar OSes are being used, differences exist: </li></ul><ul><ul><li>Lesser users of Cell Phones are “tech literate” </li></ul></ul><ul><ul><li>Implies that it is difficult to “rollout security patches” to phones already sold </li></ul></ul><ul><ul><li>Cell Phones are always “connected” and switched on </li></ul></ul><ul><ul><li>“ Environment” keeps changing </li></ul></ul><ul><ul><ul><li>Imagine one infected phone in a stadium full of people </li></ul></ul></ul>CELL PHONE VIRUSES & SECURITY
  16. 16. Differences... <ul><li>On the positive side: </li></ul><ul><ul><li>Several variants of phones exist </li></ul></ul><ul><ul><ul><li>A malware for one type of phone may not necessarily be able to infect others </li></ul></ul></ul><ul><ul><ul><ul><li>E.g., A virus that uses an MMS exploit cannot infect a phone that does not have that facility at all </li></ul></ul></ul></ul><ul><ul><li>Cell Phone malware not yet causing critical harm </li></ul></ul><ul><ul><ul><li>At most </li></ul></ul></ul><ul><ul><ul><ul><li>they increase the user's billing, or </li></ul></ul></ul></ul><ul><ul><ul><ul><li>cause the Cell Phone phone to stop working (can be restored by a factory reset) </li></ul></ul></ul></ul>CELL PHONE VIRUSES & SECURITY
  17. 17. Different types of known Cell Phones Viruses <ul><li>Timifonica </li></ul><ul><li>Cabir </li></ul><ul><li>Commwarrior </li></ul><ul><li>Comwar </li></ul><ul><li>Duts </li></ul><ul><li>Skulls </li></ul><ul><li>Lasco.A </li></ul>CELL PHONE VIRUSES & SECURITY
  18. 18. Case study - Timifonica <ul><li>This virus was reported in 2000. </li></ul><ul><li>This was one of the first viruses that forced infected PCs to send text messages to phones. </li></ul><ul><li>the worm has not affected mobile users yet. It was just theoretical threat. </li></ul>CELL PHONE VIRUSES & SECURITY
  19. 19. Case Study – CABIR <ul><li>First Cell Phone worm </li></ul><ul><li>Spread vector – Bluetooth </li></ul><ul><li>Infected file – caribe.sis </li></ul><ul><li>15 new variants exist </li></ul>CELL PHONE VIRUSES & SECURITY
  20. 20. Case Study – Commwarrior <ul><li>Reported in March 2005. </li></ul><ul><li>It infects mainly phones running Symbian OS </li></ul><ul><li>The worm replicates itself through the phone's Multimedia Messaging System (MMS) </li></ul><ul><li>Spread through Bluetooth </li></ul><ul><li>Commwarrior also read the user's local address book for phone numbers and will then start sending MMS messages containing Commwarrior. </li></ul>CELL PHONE VIRUSES & SECURITY
  21. 21. Case Study - ComWar <ul><li>Second landmark in Cell Phone worms </li></ul><ul><li>Spread vector - Bluetooth and MMS </li></ul><ul><li>Large spread area due to MMS </li></ul><ul><li>Not as proof of concept – Intention to harm by charging the Cell Phone user </li></ul><ul><li>Multiple variants detected </li></ul>CELL PHONE VIRUSES & SECURITY
  22. 22. Case Study - Duts <ul><ul><li>It is the first known virus to infect cell phones and PC as well </li></ul></ul><ul><ul><li>Case Study- skull </li></ul></ul><ul><ul><li>The Skulls virus replaces all phone desktop icons with images of a skull. </li></ul></ul><ul><ul><li>MMS & SMS will no longer be usable </li></ul></ul>CELL PHONE VIRUSES & SECURITY
  23. 23. Case Study lasco.A <ul><li>The Lasco.A is activated when cell phone user clicks on the file and installs it </li></ul><ul><li>It spread same as above mentioned viruses </li></ul><ul><li>This Symbian malware was common for PCs, but now it is present in cell systems too </li></ul>CELL PHONE VIRUSES & SECURITY
  24. 24. Futuristic Threats <ul><li>Location Tracking </li></ul><ul><li>Camera and Microphone Bug </li></ul><ul><li>Leaking Sensitive Information </li></ul><ul><li>attack on Cell Phone Service Provider </li></ul>CELL PHONE VIRUSES & SECURITY
  25. 25. The generic security isuues…
  26. 26. Security Issues........... <ul><li>The best way to protect yourself from cell-phone viruses is the same way you protect yourself from computer viruses </li></ul><ul><li>Never open anything if you don't know what it is…. </li></ul>CELL PHONE VIRUSES & SECURITY
  27. 27. Security Issues........ <ul><li>Turn off Bluetooth discoverable mode </li></ul><ul><li>Keep you cellphone in “hidden” mode </li></ul>CELL PHONE VIRUSES & SECURITY
  28. 28. Security Issues......... <ul><li>Check security updates to learn about filenames you should keep an eye out for. </li></ul><ul><li>E.g.:-the Commwarrior program generates random names for the infected files it sends out, so users can't be warned not to open specific filenames </li></ul><ul><li>Security sites with detailed virus information include: </li></ul><ul><ul><li>F-Secure </li></ul></ul><ul><ul><li>McAfee </li></ul></ul><ul><ul><li>Symantec </li></ul></ul>CELL PHONE VIRUSES & SECURITY
  29. 29. Security Issues......... <ul><li>Install some type of security software on your phone </li></ul><ul><li>anti viruses can be downloaded from genuine sites like: </li></ul><ul><li>F-secure </li></ul><ul><li>Mac-afee </li></ul><ul><li>kaspersky </li></ul>CELL PHONE VIRUSES & SECURITY
  30. 30. <ul><li>Questions?? </li></ul>CELL PHONE VIRUSES & SECURITY
  32. 32. Thank You!!