Mobile handset security issues

November 2008 Products

Recent trends in the mobile industry show an exponential rise in the interest in open mobile platforms and terminals. With the arrival of this openness, it brings a plethora of new possibilities for customers to implement newer applications. Apart from that, developers would be able to create new applications using all the features of the handset.

However, this new wave of openness also brings with it a serious threat from hackers and spammers. The underlying hardware and firmware of a mobile device are continuously vulnerable to the ever-increasing embedded hacker community. More often than not, the trust levels, which are necessary in the lower end of the mobile handset, are always prone to security breach. There is a current trade off in the mobile industry between mobile user experience and potential data loss.

Frost & Sullivan believes that the right strategy to establish an optimum balance for the developer community and the end user while reducing the risk posed by hackers is the biggest challenge for open mobile platforms. Although new wireless technologies are growing at a rapid pace, there is a worldwide fear of the inherent opportunities it brings for the malware community.

Short range wireless technologies such as Bluetooth have also been exposed to hackers due to their inherent security vulnerabilities. Bluetooth hacking techniques such as bluejacking and bluesnarfing have resulted in heavy data and revenue losses.

Although the mobile industry has taken several initiatives to protect their devices, such as implementing subscriber identity module (SIM) locks and international mobile equipment identity (IMEI) codes, the black market of stolen devices not only provides evidence of the technical deficiencies in them, but also acts as an ideal platform for hackers to learn more about security technologies and vulnerabilities. As the industry moves toward implementing high-end security technologies in mobile devices, the criminal community is expected to consolidate existing skill sets in order to crack the toughest security codes.

The trend toward more openness in mobile phones comes with a serious cause for concern for manufacturers, as implementing advanced security technology over a plethora of available applications is a complicated task. Coupled with this trend is the fact that data storage on mobile phones is increasingly significantly, making them more appealing targets for cyber criminals.

A great deal of research is expected to be centred on the antitheft measures and security counter measures in mobile devices, thereby bringing some hope to the end user, the mobile manufacturer, and developer industry. The arrival of new security technologies promises to assess and mitigate various issues with mobile data theft. However, much remains to be done, and the cat and mouse game between the mobile and the hacker industries will be ongoing. There is still a vast industry-wide need to find an optimum balance between critical aspects of the mobile handset, the unavailability of which could quite easily compromise businesses for mobile platform developers and service providers.

For more information on Frost & Sullivan’s technical & market analysis, please contact Patrick Cairns on [email protected].

For more information contact Patrick Cairns, Corporate Communications - Africa, Frost & Sullivan, +27 (0)18 468 2315, [email protected], www.frost.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Turkish university installs IDIS surveillance
CCTV, Surveillance & Remote Monitoring Products
IDIS video streamlines complex surveillance systems for learning institution, upgrading a 350-camera system with 24/7 control room monitoring to transform security for Social Sciences University of Ankara (ASBU).

Read more...
Brighter, greener, and smarter
Dahua Technology South Africa Products CCTV, Surveillance & Remote Monitoring
Dahua Technology released its new Dahua CH II Series Indoor Fine Pixel Pitch LED display, providing visual clarity and promoting energy efficiency and sustainability.

Read more...
Long-distance connectivity with Simplex ES Net Life Safety
Johnson Controls Global Products Fire & Safety Products
ES Net Network Bridge allows fire alarm system data to be transmitted across distant buildings via a customer’s existing network infrastructure, improving system-wide monitoring and control in facilities and campuses where life safety networks are often widely dispersed.

Read more...
Visitor management via QR code
ATG Digital Access Control & Identity Management Products
ATG Digital has launched its QR Code Reader to enhance access control's security and efficiency. The new QR Code Reader enables seamless, contactless access control, creating an efficient user journey.

Read more...
District secures activity centre
Paxton Access Control & Identity Management Products
Paxton’s Net2 access control solution is a user-friendly and flexible networked access control system, which made installing and managing access control security at an activity centre straightforward.

Read more...
Manage security systems remotely
Hikvision South Africa CCTV, Surveillance & Remote Monitoring IT infrastructure Products
Hikvision launched a new generation of smart managed switches that, in conjunction with the Hik-Partner Pro mobile app, enable installers to remotely deploy and configure security systems with comprehensive operation and maintenance capabilities.

Read more...
From overwhelm to oversight
Editor's Choice Cyber Security Products
Security automation is vital in today’s world, and Microsoft Sentinel is a widely adopted, but complex answer. ContraForce is an easy-to-use add-on that automatically processes, verifies and warns of threats round-the-clock.

Read more...
Synology enhances functions for advanced surveillance integration
Technews Publishing CCTV, Surveillance & Remote Monitoring IT infrastructure Products
With the capability to function as both an API client and server, Surveillance Station offers a versatile platform for integration, whether it's embedding video streams into other platforms or overlaying external data onto recorded video.

Read more...
Simplify adoption of Generative AI
News IT infrastructure Products
Nutanix simplifies adoption of Generative AI with Nutanix GPT-in-a-Box, an AI infrastructure solution that accelerates customers’ path to GPT and LLMs while keeping organisations in control of their data.

Read more...
ZK-IWB Series
ZKTeco Products Access Control & Identity Management
Experience the ultimate virtual meeting solution with ZKTeco’s ZK-IWB system. Featuring a built-in 13-megapixel UHD camera and 6-microphone array, the solution ensures clear audio and video experiences with an 8 metre pickup distance.

Read more...