Friday, February 15, 2008

Protect the Privacy of Your Smart Phone

Jordan Meddy, NCC News

The latest generation of smart phones is allowing people to combine many of their electronic activities into one device. But as mobile devices become more like mobile computers, they'll be prone to the same security threats now facing personal computers athome. "Fundamentally these smart phone devices are portable computers. They’re a full blown operating system and as such they have security vulnerabilities,” said Dave Molta, Director of the Center for Emerging Network Technologies (CENT) at Syracuse University.
Nearly 8 million smart phone devices were lost last year and smart phones were 40 percent more likely to be lost than regular cell phones, according to InStat. Users can pay a steep price if their device is lost or stolen, especially with the new types of information people store on mobile devices. “For example on my smart phone if you were an inquisitive and creative enough person you might be able to find my brokerage account, that I have in my own code, but it is there,” Molta said.

Convenience and style are what convinced Syracuse University student Taylor Weidman to buy an iPhone eight months ago. Weidman tries not to keep vital personal information on the device. He says he doesn't worry much about his iPhone's security, but realized recently the need to be careful. “I downloaded a program that lets you control your computer from your phone,” Weidman said. “And then I realized that anyone that got my password could go in and get all my stuff from my computer. So I deleted that program and got rid of it. That didn’t make me comfortable at all.”
Users should also be aware of the so called "virus threat." Like on personal computers, smart phone users can receive spyware when connected to a network that allows others to gain access to their data. Vendors are concerned with security, but it's hard--they say-- tokeep up with those who try to break through. “Apple’s been pretty good about patching the iPhone so far,” said Sean Ginevan, a technology analyst for CENT. “But it’s really become a war between the hackers who want to keep their device free and Apple who wants to try to keep it secure.”
Experts warn that as technology evolves...so too will privacy threats or identity theft. And for that--they say--people must take the lessons from computer desktops at home...to their smart phones on the road.

No comments: