12.24.2009 02:13 AM
With phones today you can practically manage your entire life, i.e. plan your day with your calendar while checking your e-mail, online banking and surfing the web, and reading/writing documents and spreadsheets.
This is great but I have read articles about phones being an easy target for hackers and wonder how much trust I should really put into this little box of tricks?
12.24.2009 10:11 AM
12.24.2009 01:22 PM
12.24.2009 04:56 PM
One thing most people don't know is that the passcode to the iPhone is configurable. By default it is a 4-digit number. You can change that to be something more secure, similar to a blackberry, to be alphanumeric and of any length.
As far as enterprises, they can control the security of an iPhone by being able to lock from there systems if something happens, preventing anything from being done on the phone until they unlock it again. They can also wipe the device to prevent any attack attempts. MobileMe can do some of that functionality but not all. The iPhone is design as a serious competitor to the blackberry with enterprises and did a good job of that.
10.07.2010 05:20 PM
Kudos to you for considering security on your handset. It is often overlooked.
Hacking a phone is not exactly "easy". Researchers have been advancing their understanding of the various security models on the platforms in the marketplace, but for now, there aren't really any attacks that affect all devices the same. There are examples of single instance device vulnerabilities out there and in most instances those vulnerabilities have been addressed through software updates.
The far bigger area of concern for most users probably should be applications from appstores. Just because someone is smart enough to write an application for a handset doesn't mean that they're trustworthy. Users should have some understanding of how to tell whether an application might be dangerous for them. You can do this by understanding your platform's prompting model.
Prompting informs you that an application is going to do something that might have privacy or billing ramifications. For example, if the application is going to use the GPS radio to locate you, you will see some notification from the device (either at installation or execution time, depending on the platform) informing you that this is the case. When an application prompts you for permission, you should pay attention- your decision will have ramifications for your privacy. Understanding application propmting should enable you to guage whether or not the fun little pacman game you downloaded isn't secretly stalking you.
Your device is trustworthy as long as you understand it's limitations and how it works. Look into your device's platform to understand the security model.
Here are some links to help you get a handle on the various security models for handsets:
Windows Phone 7:
- of 1