Skip to main content

The WiKID Blog

Viewing posts tagged Information Security

tower-group-pushes-two-factor-authentication-for


Clearly, we need to do a better job of promoting WiKID.

trusted-computing-for-mobile-devices

There is a new specification for mobile phone security called the Mobile Security Specification. It is essentially trusted computing for cell phones.

The specification has been years in development, said Janne Uusilehto, head of Nokia product security and the chairman of the working group developing this technology. "It is a big deal. This is the first time that we have created such common security specifications for all handheld devices," Uusilehto said.
More:
When these devices appear, they will make things more difficult for data thieves and mobile virus writers. Down the line, the technology could be used to build electronic wallets into mobile phones. In general terms, the specification calls on hardware vendors to store protected information in a secure area of the phones. Similar to the Trusted Platform Module used in PCs, this technology could be used to ensure that the phone's operating system, applications and data have not been tampered with.

All the usual trusted computing warnings apply here, but perhaps more so as cell carriers maintain a 'walled garden' and can limit the devices available. They are also essentially 'tri-opolies'. It seems likely that you will be able to buy a computer without TCP in the future. You might not be able to buy a cell phone without it (that works on a carrier).

two-factor-authentication-needed-to-protect

I blogged a long time ago about how social engineers got Paris Hilton's address book from T-Mobile. Now we learn that Paris is allegedly got the password to Lindsey Lohan's Blackberry:

This cyber fued between the girls started last month, when Page Six ran an item that indicated the password to Lindsay's Blackberry had been leaked. Her rep told Page Six people were sending "disgusting and very mean messages that everyone thought were coming from Lindsay. They weren't. We now have her lawyers looking into it. Some people think Paris may have been involved because the wording of the messages sounds very familiar."
Of course, unlike the Sidekick, getting the password to a Blackberry does you no good unless you also have possession of the device. More than likely, they got hold of here email password.

from-the-what-goes-around-comes-around-dept

The AP is reporting that a laptop in a stolen car contained personal information on alledged identity thiefs:

Many of the people whose data were compromised were being investigated for possible fraud and identity theft, said Joel Winston, associate director of the FTC's Division of Privacy and Identity Theft Protection.

google-corporate-blog-hacked-again

While I'm here, here is a quicky: Google's blog has been hacked again

Recent Posts

Archive

2022
2021
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008

Categories

Tags

Authors

Feeds

RSS / Atom