Wake-up call: Draft security pub looks at cell phones, PDAs

July 10, 2008

In recent years cell phones and PDAs—"Personal Digital Assistants"—have exploded in power, performance and features. They now often boast expanded memory, cameras, Global Positioning System receivers and the ability to record and store multimedia files and transfer them over wireless networks—in addition to the cell phone system—using WiFi, infrared and Bluetooth communications. Oh, yes, and make phone calls.

On July 7, the National Institute of Standards and Technology published for comment draft guidelines on security considerations for cell phones and PDAs.

Part of a series of publications on computer security issues, the draft guidelines provide an overview of cell phones and PDA devices in use today and the growing security threats that they face and propose a framework that organizations can use to manage the security risks.

"The security issues for cell phones and PDAs range beyond those of other computer equipment," the NIST authors observe. "Moreover, many common safeguards available for desktop and networked computers are generally not as readily available across a broad spectrum of handheld device types."

The draft document notes that some security enhancements better known in the personal computer world are becoming available for PDAs and smart phones, including stronger user authentication systems based on biometrics, and firewall, antivirus and intrusion detection software.

Draft NIST computer security publications including Guidelines on Cell Phone and PDA Security (Special Publication 800-124 Draft) are available online from the NIST Computer Security Resource Center at csrc.nist.gov/publications/PubsDrafts.html .

Source: National Institute of Standards and Technology

Explore further: Cellphones can steal data from 'air-gapped computers'

Related Stories

Cellphones can steal data from 'air-gapped computers'

July 28, 2015

Researchers at the Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have discovered that virtually any cellphone infected with a malicious code can use GSM phone frequencies to steal critical information ...

Is your phone safe from hackers?

July 28, 2015

A multimedia text could be the vessel that cripples as many as 950 million Android phones around the world, a mobile security expert warned in a Forbes article on Monday.

Researcher to talk at Black Hat on 'scary' area in Android

July 28, 2015

Does that cute little green robotic creature with two ear-sticks call up feelings of an open, friendly mobile operating system, aka Android? Wow, Monday stories were not about how cute and adorable is that little green creature. ...

Blacklist warnings spread on websites in North Korea

July 2, 2015

North Korea, already one of the least-wired places in the world, appears to be cracking down on the use of the Internet by even the small number of foreigners who can access it with relative freedom by blacklisting and blocking ...

FBI: Surveillance flights by the book, rarely track phones

June 18, 2015

The FBI assured Congress in an unusual, confidential briefing that its plane surveillance program is a by-the-books operation short on high-definition cameras—with some planes equipped with binoculars—and said only five ...

Recommended for you

Microsoft describes hard-to-mimic authentication gesture

August 1, 2015

Photos. Messages. Bank account codes. And so much more—sit on a person's mobile device, and the question is, how to secure them without having to depend on lengthy password codes of letters and numbers. Vendors promoting ...

Power grid forecasting tool reduces costly errors

July 30, 2015

Accurately forecasting future electricity needs is tricky, with sudden weather changes and other variables impacting projections minute by minute. Errors can have grave repercussions, from blackouts to high market costs. ...

Netherlands bank customers can get vocal on payments

August 1, 2015

Are some people fed up with remembering and using passwords and PINs to make it though the day? Those who have had enough would prefer to do without them. For mobile tasks that involve banking, though, it is obvious that ...

0 comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.