Bits from Bill

Technology thoughts leaking from the brain of "Bill Pytlovany"

Friday, August 14, 2009

Cell Phone Security Part 1

Last summer I spoke at a conference of trainers for the National Network to End Domestic Violence. One of topics of interest was cell phone security. After reading so many news stories lately about cell phone hacking I thought it was important to renew this topic. Most of the tips still apply today.


One important thing to remember is your cell phone or Blackberry is a computer. It stores your personal data and is designed to communicate easily with the world. Proper use includes keeping your data backed up regularly and keeping it secure. One of the common ways your cell phone or smart phone communicate is using technology called Bluetooth. Just like your computer, you should know about the following.


· Discovery Mode
This is a special mode that allows you to sync or pair up two devices that provide Bluetooth communications. In discovery mode information about your cell phone is readily available to Bluetooth scanners. In most new phones, when you turn on Discovery mode it will only be available for a short time frame. While this sometimes makes it a pain to pair up devices it’s a great safety feature. Your phone should never remain in Discovery Mode.


· Keep your Phone to yourself
Don’t let others mess around with your phone. Every phone has a physical Bluetooth network address which can’t be changed. Someone checking out your phone can find this numeric address and use it to communicate with your phone even when it’s not in discovery mode. This unique number can not be changed and will look something like 11:1A:D9:EB:11:C7


· Passwords
Just like on your computer your password should not be 1234 or your birthday. It should not be your address, pets name or the same as your ATM pin.


· Unsoliticated Connection Requests
Don’t be shocked if you receive a request to connect for an update or what looks like a news story or free ringtone. It’s very possible this could be an illegitimate attempt at a pairing. If you do get an unsolicited request reply No. If it appears to come from your phone company, you can always call them directly to confirm.


· Update your firmware
Again, just like on your computer, you should regularly connect to your phone vendor and see if any “firmware” updates are available. It’s possible that some kind of security hole was found in your phone’s software and a firmware update could be needed to repair it.


· Encryption
When syncing up your address book or or other data with your computer check to see if encryption is available. This may require you to remember another password but it’s a good idea. While Bluetooth data is designed to only be available in short distances there are long range antenna’s out there which have the ability to read Bluetooth data from a distance.


In part two I’ll review some of the most recent hacker techniques and what products are available that might be able to protect you.


Labels: , , ,

Share on Facebook


0 Comments:

Post a Comment

<< Home