BLUETOOTH WEAKNESSES

ENCRYPTION The Bluetooth specification does not describe encryption, some manufacturers produce devices without encryption or the encryption mode is deactivated by factory setting. The E0 algorithm is used for Bluetooth encryption. The E0 encryption is a typical stream cipher. The plaintext is encrypted with XOR: plaintext XOR key-password. The cyclic redundancy check (CRC) checksum is … Read more

BLUETOOTH ATTACKS

BLUETOOTH ATTACKS ON MOBILE PHONES BLUESNARF: SNIFFING Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. This allows access to a calendar, contact list, emails and text messages, and on some phones users can copy pictures and private videos. Currently available programs … Read more

BLUETOOTH

WHAT IS BLUETOOTH? & HOW DOES IT WORK? Bluetooth is an open wireless protocol for exchanging data over short distances between devices. It’s not a wireless Internet connection like Wi-Fi. It’s a fast way to hook up devices without cords, such as headsets connected to cell phones, computers connected to wireless printers or keyboards, or … Read more

MOBILE SECURITY IMPORTANCE

“WHY IS MOBILE SECURITY IMPORTANT?” Mobile devices are the fastest growing consumer technology, with worldwide unit sales expected to increase from 300 million in 2010, to 650 million in 2012. Mobile applications are likewise booming. In June 2011, for the first time ever people on average spent more time using mobile applications (81 minutes) than … Read more

SIM

A SIM card orSubscriber Identity Module is a portable memory chip used in some models of cellular telephones. The SIM card makes it easy to switch to a new phone by simply sliding the SIM out of the old phone and into the new one. The SIM holds personal identity information, cell phone number, phone … Read more

PROTOCOLS USED IN MOBILE

The Main Protocols used by Mobile Phones: SMS EMS MMS WAP. INTRODUCTION TO SMS MESSAGING- SMS stands for Short Message Service. It is a technology that enables the sending and receiving of messages between mobile phones. SMS first appeared in Europe in 1992. It was included in the GSM (Global System for Mobile Communications) standards … Read more

MOBILE PHONE STANDARDS

ADVANCED MOBILE PHONE SYSTEM (AMPS) Advanced Mobile Phone System (AMPS) was an analogmobile phone system standard developed by Bell Labs, and officially introduced in the Americas in 1983 and Australia in 1987. It was the primary analog mobile phone system in North America (and other locales) through the 1980s and into the 2000s. As of … Read more

MOBILE GENERATION

In 1895 a few years after invention of telephone, Marconi demonstrated the first radio based wireless transmission. The first radio based conversation was used in ships during 1915. The first public mobile telephone system known as Mobile Telephone System (MTS) was introduced in United States in 1946. AT&T Bell laboratories devised the cellular concept which … Read more

VPN THREATS

“VPN THREATS” HACKING ATTACKS- A client machine may become a target of attack, or a staging point for an attack, from within the connecting network. An intruder could exploit bugs or mis-configuration in a client machine, or use other types of hacking tools to launch an attack. These can include VPN hijacking or man-in-the-middle attacks. … Read more

IPSEC VPN and VPN SECURITY ISSUES

“IPSEC VPN” IPSec (Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing layer of network communication. Earlier security approaches have inserted security at the application layer of the communications model. IPSec is said to be especially useful for implementing virtual private networks and for remote … Read more