<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Mikko Hypponen: Average Smartphone User or Black Swan?</title>
	<atom:link href="http://spiresecurity.com/?feed=rss2&#038;p=402" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com/?p=402</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Wed, 21 Aug 2013 23:28:51 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
	<item>
		<title>By: angel</title>
		<link>http://spiresecurity.com/?p=402&#038;cpage=2#comment-659</link>
		<dc:creator>angel</dc:creator>
		<pubDate>Sat, 26 Aug 2006 20:54:13 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=402#comment-659</guid>
		<description><![CDATA[Maybe it&#039;s just that Bluetooth virii are big in Portugal - try going around shopping centers with ur bluetooth turned on and don&#039;t tell me a BT virus doesn&#039;t try to attack you. I quit having my BT turned on in public places because virii like Cabir just keep trying to spread and send messages to your phone.

So before you call someone a liar, do your research.


]]></description>
		<content:encoded><![CDATA[<p>Maybe it&#8217;s just that Bluetooth virii are big in Portugal &#8211; try going around shopping centers with ur bluetooth turned on and don&#8217;t tell me a BT virus doesn&#8217;t try to attack you. I quit having my BT turned on in public places because virii like Cabir just keep trying to spread and send messages to your phone.</p>
<p>So before you call someone a liar, do your research.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Heikki</title>
		<link>http://spiresecurity.com/?p=402&#038;cpage=2#comment-658</link>
		<dc:creator>Heikki</dc:creator>
		<pubDate>Thu, 10 Aug 2006 10:04:40 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=402#comment-658</guid>
		<description><![CDATA[Friday one of my friends asked for help with his N70, and when I looked at it I noticed it had CommWarrior. He didn&#039;t know how he got it. I think it&#039;s quite understandable, because he isn&#039;t used to computers and especially S60 computers.
That made me wonder how frequent these viruses are and I remembered this post. I changed my phones bt settings so everybody could see me and yesterday I got my first carib.sis on a train from Paris to Brussels. For me it was quite funny, but I can imagine how someone else would have installed it.
S60 devices are sold as normal phones and users doen&#039;t understand that they can do something farmful by answering yes instead of no, to a question they don&#039;t fully understand. Most users don&#039;t know they can install software on their phone, so those questions can look quite bizarre.

-Heikki
]]></description>
		<content:encoded><![CDATA[<p>Friday one of my friends asked for help with his N70, and when I looked at it I noticed it had CommWarrior. He didn&#8217;t know how he got it. I think it&#8217;s quite understandable, because he isn&#8217;t used to computers and especially S60 computers.<br />
That made me wonder how frequent these viruses are and I remembered this post. I changed my phones bt settings so everybody could see me and yesterday I got my first carib.sis on a train from Paris to Brussels. For me it was quite funny, but I can imagine how someone else would have installed it.<br />
S60 devices are sold as normal phones and users doen&#8217;t understand that they can do something farmful by answering yes instead of no, to a question they don&#8217;t fully understand. Most users don&#8217;t know they can install software on their phone, so those questions can look quite bizarre.</p>
<p>-Heikki</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Erka</title>
		<link>http://spiresecurity.com/?p=402&#038;cpage=1#comment-657</link>
		<dc:creator>Erka</dc:creator>
		<pubDate>Mon, 07 Aug 2006 19:34:46 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=402#comment-657</guid>
		<description><![CDATA[Pete, All,

I have no reason to suspect Mikko&#039;s testimony. I personally haven&#039;t received any bluetooth worms in my phone (as I have BT disabled most of the time). Instead, I have had the &quot;pleasure&quot; of cleaning other people&#039;s mobile terminals after they have been hit by a worm in Helsinki, Finland. At least one of the cases involved BT, some were caught via MMS.

The pleasure-part had actually mostly to do with me getting a convenient excuse to pay a visit to F-Secure&#039;s mobile virus lab to verify the infections..

CERT-FI also received reports of infections via BT during the world championship games in Helsinki last summer. Still, I suspect the heavy rain that plagued the games caused damage to more handsets than any malware could&#039;ve at the time. ;)
]]></description>
		<content:encoded><![CDATA[<p>Pete, All,</p>
<p>I have no reason to suspect Mikko&#8217;s testimony. I personally haven&#8217;t received any bluetooth worms in my phone (as I have BT disabled most of the time). Instead, I have had the &#8220;pleasure&#8221; of cleaning other people&#8217;s mobile terminals after they have been hit by a worm in Helsinki, Finland. At least one of the cases involved BT, some were caught via MMS.</p>
<p>The pleasure-part had actually mostly to do with me getting a convenient excuse to pay a visit to F-Secure&#8217;s mobile virus lab to verify the infections..</p>
<p>CERT-FI also received reports of infections via BT during the world championship games in Helsinki last summer. Still, I suspect the heavy rain that plagued the games caused damage to more handsets than any malware could&#8217;ve at the time. <img src='http://spiresecurity.com/blog/wp-includes/images/smilies/icon_wink.gif' alt=';)' class='wp-smiley' /> </p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Giovanni Bajo</title>
		<link>http://spiresecurity.com/?p=402&#038;cpage=1#comment-656</link>
		<dc:creator>Giovanni Bajo</dc:creator>
		<pubDate>Sun, 06 Aug 2006 18:43:11 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=402#comment-656</guid>
		<description><![CDATA[Hi, I&#039;m in Italy and I have received mobile viruses on my mobile phone through bluetooth several times (I would say 4 distinct times, at least). It happened to a friend of mines too, once, in my presence.

What happens is that while you are in a busy place (a restaurant, or a shopping mall), you receive a message saying that an unknown user is trying to send you a file, whose name looks like random character (&quot;kgrtfatsd.sis&quot; or something). If you press &quot;no&quot; and holds for a while without moving around, you often receive another similar message within a couple of minutes. If you hit &quot;yes&quot;, the file is transferred, and then my Nokia phone asks for permission to execute it, at which point I always hit &quot;no&quot;.

I specifically remember that one of the times it happened to me I was in a restaurant, and I eventually had to turn off bluetooth in my mobile phone because it was getting annoyed pretty quick (my phone was being bombed with new virus messages, coming from the same device, every 2 minutes). In at least one occasion, I have tried to send a text message through bluetooth to the infected phone warning about the virus infection, but I did not receive any answer.



]]></description>
		<content:encoded><![CDATA[<p>Hi, I&#8217;m in Italy and I have received mobile viruses on my mobile phone through bluetooth several times (I would say 4 distinct times, at least). It happened to a friend of mines too, once, in my presence.</p>
<p>What happens is that while you are in a busy place (a restaurant, or a shopping mall), you receive a message saying that an unknown user is trying to send you a file, whose name looks like random character (&#8220;kgrtfatsd.sis&#8221; or something). If you press &#8220;no&#8221; and holds for a while without moving around, you often receive another similar message within a couple of minutes. If you hit &#8220;yes&#8221;, the file is transferred, and then my Nokia phone asks for permission to execute it, at which point I always hit &#8220;no&#8221;.</p>
<p>I specifically remember that one of the times it happened to me I was in a restaurant, and I eventually had to turn off bluetooth in my mobile phone because it was getting annoyed pretty quick (my phone was being bombed with new virus messages, coming from the same device, every 2 minutes). In at least one occasion, I have tried to send a text message through bluetooth to the infected phone warning about the virus infection, but I did not receive any answer.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Lauri Ahonen</title>
		<link>http://spiresecurity.com/?p=402&#038;cpage=1#comment-655</link>
		<dc:creator>Lauri Ahonen</dc:creator>
		<pubDate>Sat, 05 Aug 2006 19:56:33 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=402#comment-655</guid>
		<description><![CDATA[I just wanted to pop in to say that I&#039;ve seen two mobile viruses so far - Both of them tried to infect me in pizzerias! So at least in Finland where smartphones are common and smartpeople are scarse the threat is real.
]]></description>
		<content:encoded><![CDATA[<p>I just wanted to pop in to say that I&#8217;ve seen two mobile viruses so far &#8211; Both of them tried to infect me in pizzerias! So at least in Finland where smartphones are common and smartpeople are scarse the threat is real.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Rob</title>
		<link>http://spiresecurity.com/?p=402&#038;cpage=1#comment-654</link>
		<dc:creator>Rob</dc:creator>
		<pubDate>Sat, 05 Aug 2006 17:17:33 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=402#comment-654</guid>
		<description><![CDATA[This discussion reinforces my view that the way to go with all embedded devices is a trusted,real-time embedded Linux system that is deny-by-default. They will just not be susceptible to worms and virii that way.
]]></description>
		<content:encoded><![CDATA[<p>This discussion reinforces my view that the way to go with all embedded devices is a trusted,real-time embedded Linux system that is deny-by-default. They will just not be susceptible to worms and virii that way.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Salmi</title>
		<link>http://spiresecurity.com/?p=402&#038;cpage=1#comment-653</link>
		<dc:creator>Salmi</dc:creator>
		<pubDate>Fri, 04 Aug 2006 10:58:01 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=402#comment-653</guid>
		<description><![CDATA[I have been hit couple of times by Commwarrior.B. First time was on the bus and it was impossible to know whether it came inside the the bus or from some car around. That happened in Helsinki, Finland.
Second time was in Island of Crete (Greece)in a hotel: bartender was sending Commwarrior.B around the bar. Guy had named his phone jorgos in greek letters so it was quit easy to find. Cleaning his phone wasn&#039;t that easy (no cable, no computer, nothing) but I made it anyway. Last days of my vacation drinks were free in that bar ;-)
And yes, I use av for mobile phones.
]]></description>
		<content:encoded><![CDATA[<p>I have been hit couple of times by Commwarrior.B. First time was on the bus and it was impossible to know whether it came inside the the bus or from some car around. That happened in Helsinki, Finland.<br />
Second time was in Island of Crete (Greece)in a hotel: bartender was sending Commwarrior.B around the bar. Guy had named his phone jorgos in greek letters so it was quit easy to find. Cleaning his phone wasn&#8217;t that easy (no cable, no computer, nothing) but I made it anyway. Last days of my vacation drinks were free in that bar <img src='http://spiresecurity.com/blog/wp-includes/images/smilies/icon_wink.gif' alt=';-)' class='wp-smiley' /><br />
And yes, I use av for mobile phones.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Mark Johnson</title>
		<link>http://spiresecurity.com/?p=402&#038;cpage=1#comment-652</link>
		<dc:creator>Mark Johnson</dc:creator>
		<pubDate>Wed, 02 Aug 2006 20:12:38 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=402#comment-652</guid>
		<description><![CDATA[Also be aware that these viruses spread through SMS as well so bluetooth is not the only channel for getting a mobile virus.

This isn&#039;t hype. This is real.  Better to address the issue in advance before it blows up and runs rampant.

]]></description>
		<content:encoded><![CDATA[<p>Also be aware that these viruses spread through SMS as well so bluetooth is not the only channel for getting a mobile virus.</p>
<p>This isn&#8217;t hype. This is real.  Better to address the issue in advance before it blows up and runs rampant.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Mark E.</title>
		<link>http://spiresecurity.com/?p=402&#038;cpage=1#comment-651</link>
		<dc:creator>Mark E.</dc:creator>
		<pubDate>Wed, 02 Aug 2006 18:48:29 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=402#comment-651</guid>
		<description><![CDATA[sorry dont want to take it off topic but having your phone in your pocket and using a bluetooth headset protects you from bluetooth hacks as the phone will only accept one device being connected... and I havent found any deauthentication bugs yet ...
]]></description>
		<content:encoded><![CDATA[<p>sorry dont want to take it off topic but having your phone in your pocket and using a bluetooth headset protects you from bluetooth hacks as the phone will only accept one device being connected&#8230; and I havent found any deauthentication bugs yet &#8230;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Mark E.</title>
		<link>http://spiresecurity.com/?p=402&#038;cpage=1#comment-650</link>
		<dc:creator>Mark E.</dc:creator>
		<pubDate>Wed, 02 Aug 2006 18:42:28 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=402#comment-650</guid>
		<description><![CDATA[ok Mark, got your point, indeed to implement such a solution might take some time, but again face reality. I read your post and did some quick research, check t-mobiles website, fsecure and symantec aswell as other vendors like trendmicro offer a solution for currently 6 out of 43 offered phones and by the way your mentioned blackberry is not even included. so this is like 14% of the currently available devices through their store. its only Symbian 6.1,7,8,9.1 and windows mobile devices. if I counted correctly fsecure supports like 50 devices out of how many available ones (remeber 6 of 43 at t-mobile)? For most bluetooth vulnerable devices  based on symbian secured firmware does exist and nokia fixes that for 20eur or within warranty for free. this is less than any of the sulotions cost at start or even free. sure people might not do that, but when something happens dont you think they might? symbian doesnt allow installation of anything without acceptance of the user neither does windows mobile. and regarding your scenario of stopping mobile viruses what about proxy based solutions the devices are using NAT anyway what about VLAN technologies VLAN-to-proxy-internet_aaccept_any_in_out, VLAN-VLAN_deny. so you end up with bluetooth or wireless lan connections again which end up to a local firewall out_accept_any in_accept_any_if_allowed_or_established_or_related. emails scanned on the smtp servers. where is the threat? all this technology is nearly in place but not configured properly as always but if I dont get the point. neither I believe there is a need for it. and yes some operators do build images for the phones but havent you heard that most customers use some sort of service that will bring the original firmware to the phone or by it off the shelf so its the original software and not modified by any operator?

i cant believe so many believe the hype for me it is just another one saying &quot;i have a dream&quot; and now a business model
]]></description>
		<content:encoded><![CDATA[<p>ok Mark, got your point, indeed to implement such a solution might take some time, but again face reality. I read your post and did some quick research, check t-mobiles website, fsecure and symantec aswell as other vendors like trendmicro offer a solution for currently 6 out of 43 offered phones and by the way your mentioned blackberry is not even included. so this is like 14% of the currently available devices through their store. its only Symbian 6.1,7,8,9.1 and windows mobile devices. if I counted correctly fsecure supports like 50 devices out of how many available ones (remeber 6 of 43 at t-mobile)? For most bluetooth vulnerable devices  based on symbian secured firmware does exist and nokia fixes that for 20eur or within warranty for free. this is less than any of the sulotions cost at start or even free. sure people might not do that, but when something happens dont you think they might? symbian doesnt allow installation of anything without acceptance of the user neither does windows mobile. and regarding your scenario of stopping mobile viruses what about proxy based solutions the devices are using NAT anyway what about VLAN technologies VLAN-to-proxy-internet_aaccept_any_in_out, VLAN-VLAN_deny. so you end up with bluetooth or wireless lan connections again which end up to a local firewall out_accept_any in_accept_any_if_allowed_or_established_or_related. emails scanned on the smtp servers. where is the threat? all this technology is nearly in place but not configured properly as always but if I dont get the point. neither I believe there is a need for it. and yes some operators do build images for the phones but havent you heard that most customers use some sort of service that will bring the original firmware to the phone or by it off the shelf so its the original software and not modified by any operator?</p>
<p>i cant believe so many believe the hype for me it is just another one saying &#8220;i have a dream&#8221; and now a business model</p>
]]></content:encoded>
	</item>
</channel>
</rss>
