Skip to main content

The WiKID Blog

Viewing posts tagged Information Security


Clearly, we need to do a better job of promoting WiKID.


There is a new specification for mobile phone security called the Mobile Security Specification. It is essentially trusted computing for cell phones.

The specification has been years in development, said Janne Uusilehto, head of Nokia product security and the chairman of the working group developing this technology. "It is a big deal. This is the first time that we have created such common security specifications for all handheld devices," Uusilehto said.
When these devices appear, they will make things more difficult for data thieves and mobile virus writers. Down the line, the technology could be used to build electronic wallets into mobile phones. In general terms, the specification calls on hardware vendors to store protected information in a secure area of the phones. Similar to the Trusted Platform Module used in PCs, this technology could be used to ensure that the phone's operating system, applications and data have not been tampered with.

All the usual trusted computing warnings apply here, but perhaps more so as cell carriers maintain a 'walled garden' and can limit the devices available. They are also essentially 'tri-opolies'. It seems likely that you will be able to buy a computer without TCP in the future. You might not be able to buy a cell phone without it (that works on a carrier).


I blogged a long time ago about how social engineers got Paris Hilton's address book from T-Mobile. Now we learn that Paris is allegedly got the password to Lindsey Lohan's Blackberry:

This cyber fued between the girls started last month, when Page Six ran an item that indicated the password to Lindsay's Blackberry had been leaked. Her rep told Page Six people were sending "disgusting and very mean messages that everyone thought were coming from Lindsay. They weren't. We now have her lawyers looking into it. Some people think Paris may have been involved because the wording of the messages sounds very familiar."
Of course, unlike the Sidekick, getting the password to a Blackberry does you no good unless you also have possession of the device. More than likely, they got hold of here email password.


The AP is reporting that a laptop in a stolen car contained personal information on alledged identity thiefs:

Many of the people whose data were compromised were being investigated for possible fraud and identity theft, said Joel Winston, associate director of the FTC's Division of Privacy and Identity Theft Protection.


While I'm here, here is a quicky: Google's blog has been hacked again

Recent Posts







RSS / Atom