Malicious Software Can Turn Your Phone Against You

Posted on 10 March 2010

According to the scientists from the Rutgers University, cell phones pose a great threat for users due to malicious software that can put at risk user’s personal and financial well-being.

The scientists have been successful in creating a malware, known as a rootkit that has the capability to turn a cell phone’s microphone, GPS and battery against the phone’s owner. By doing this, the researchers have stressed on the improvement need for greater protection of cell phone software.

Although Rootkits have been around for desktop computers since the mid 1990s, but as the difference between computers and smart phones is decreasing, cell phones have become as prone to attacks as desktops.



A rootkit is quite different and more difficult to detect as compared to other viruses. A virus is a tiny program that runs on a computer’s operating system, whereas a rootkit actually replaces part of the operating system causing much more harm to the system.

The newly developed rootkit affects three different parts of a smart phone, the microphone, the GPS and the battery. Although the rootkit wasn’t actually meant to infect commercial phones; it was just an effort to show what was possible and encourage research to fight these threats.

Through the rootkit, the scientists are able to turn on the phone’s microphone anytime they wanted, listening to nearby conversations. The rootkit can also be used to find out the phone’s location, using the GPS system, allowing the scientists to track the phone and the person using it from anywhere. It is also possible to use the rootkit to drain the phone’s battery by activating power-hungry hardware like the GPS receiver and the Bluetooth.

The rootkit works silently, and the user won’t realize that anything is wrong unless the phone’s owner pays special attention to their device.

Rootkits are also capable of affecting other parts of the phone, including the camera, the touchscreen and even the number pad. For example. when a person dials say, Bank of America to check their account balance, a hacker could redirect the phone call to another device and listen on to important conversations including person’s bank account number.

Such programs make it eminent that cell phones will soon be an even bigger target for hackers than computers, with even bigger vulnerabilities to exploit and with even bigger risks for consumers. Bluetooth in particular poses greater threat for smart phone owners as walking around with an open Bluetooth connection is just like walking around with your wallet open.

Technorati Tags: ,,,,,,,,

,,,,,,

People who liked this Post also read

  • HTC Legend Review
    The HTC Legend is a successor to the famous HTC Hero. Having almost similar specifications, there are some hardware differences present that include AMOLED display, aluminum body, faster CPU at 600MHz and increased amount of RAM, i.e. 384MB against 288MB....
  • The Samsung Genoa C3510 Mobile Phone
    If you are a big fan of touchscreen mobile phones, but couldn’t afford one till now, then here’s one mobile phone that will surely attract you....
  • Race Around Your Streets On Ovi Maps Racing
    If you love to speed up and wish to race around in your local town, then be thankful to Nokia as your wish has been granted by the Ovi Maps Racing....
  • Nokia E72 Review
    If you prefer easy messaging and longer battery life over other features, then Nokia E Series brings you the smartphones to opt for. The build quality of the Nokia E71 was amazing and Nokia has stuck firmly to the same level of detail with the Nokia E72. ...
  • 7 Ways N900 Is Better Than iPhone
    Recently, Apple has taken over a large portion of the smart phone market, making the iPhone king of the all the smart phones. Several mobile phone manufacturers like Nokia have released different phones in competition to the iPhone. Out of these, Nokia’s ...

This post was written by:

- who has written 272 posts on ixibo.


Calendar

March 2010
M T W T F S S
« Feb   Apr »
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31