The past week has brought some new malware. A short time after the release of commwarrior, we've got a mass mms sending/Bluetooth worm . The bit where it sends its SIS file via MMS exploits the automatic running of install files under Symbian. If sent to any non-Symbian phone the result is simply the cost of the MMS message. I assumed from Vallez's notes on Cabir that he had decided against MMS as a transport mechanism in part because there is no way to tell if the recipient can run the worm. On Win32 , due to market penetration , it is very likely that addresses in the address book belong to other Win32 machines. Symbian phones do not currently have a similar market distribution.
--
Font files that prevent warm rebooting. Troublesome. It used to be common for people with Psion handhelds to backup their data in case of dead or dying batteries. Restoring from a backup after a cold boot was a rare but occasionally necessary part of maintenance. Users doing the same today with Symbian smartphones is more than we can expect. Few users would know how or even if they have all the right equipment(cables, I/R port, mmc reader). Malware that kills its host doesn't travel very far.
Info on mobile phone antivirus, anti-malware software and commentary on mobile security.
Friday, April 08, 2005
Subscribe to:
Post Comments (Atom)
Protecting the ‘Metaverse ecosystem’…: Openness is healthy
Meta’s Reality Labs has an opening for “Malware Reverse Engineer” . Not an uncommon role, but this particular one is a bit more specific whe...
-
Keys can be a bother. You forget them inside the apartment, they're stuck in a pocket or bag with your arms full, or you just lose them....
-
The Internet of Things is not as complex as one would think. Smart Objects(e.g. Power meters, Fridge computers, etc.) or "Things" ...
No comments:
Post a Comment