Research In Motion's VP of BlackBerry Security says he's concerned that online miscreants could increasingly target BlackBerry devices and other smartphones in the future, in attempts to take control of the handsets and employ them to bring down wireless carriers' cellular networks via distributed-denial-of-service (DDoS) attacks. BlackBerry and smartphone security in general hasn’t garnered much attention or concern over the past few years–at least from a consumer, or user, perspective; enterprises have been invested in mobile device security since the advent of the PDA. RIM BlackBerry “Trusted Application Status” App Install Warning But that’s going to have to change, thanks largely to the vast number of consumers embracing new, flashy smartphones like Apple’s iPhone, Motorola’s DROID and Research In Motion’s (RIM) BlackBerry Bold 9700. This plethora of new smartphone users means the potential for gain by hackers or other online baddies looking to crack smartphone security measures is drastically increasing; The more smartphone users, the more devices that could potentially be commandeered and used in various attacks. That means smartphone users are going to have to smarten up when it comes to mobile security awareness and be more vigilant in spotting and stopping potential problems before they happen. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe Scott Totzke, RIM’s VP of BlackBerry security, agrees, and he recently spoke with Reuters on the subject. Totzke told Reuters that he’s concerned compromised or “rogue” smartphones could be used in the future to target and bring down wireless carrier’s cellular networks via distributed-denial-of-service (DDoS) attacks. Traditional DDoS attacks occur when hackers take control of large groups of computers and then order them to all access one website or service at the same time, overloading servers and eventually crashing or disabling the site. Popular micro-blogging service Twitter was hit with a high-profile DDoS attack last August that brought the site down for hours. RIM’s Totzke warned that DDoS attacks could also be perpetrated on smartphone users, with wireless data packets being used to overload and disable carriers’ wireless networks. Reuters also spoke with Flexilis, a maker of mobile security software. The company’s CTO suggests that such an attack could start with users carelessly installing infected or tainted mobile applications. BlackBerry smartphones feature safeguards that prompt users after downloading new applications to determine whether or not owners want to grant the apps “Trusted Application status.” (See image above.) And most applications require users to grant certain permissions before the software can access potentially sensitive information like location- or voice-data. But because serious smartphone-related security threats are few and far between at this point, most users simply click on through the warnings without actually considering the implications of downloading and installing what should really be considered “untrusted” apps. Flexilis told Reuters that it has already identified “virus-tainted” versions of well-known, and generally trusted, applications like Google’s Google Maps for mobile, so avoiding dangerous apps may not be as simple as only installing applications that seem to come from reputable sources. RIM’s Totzke says the most effective way to protect yourself from BlackBerry viruses and other security threats is to aggressively monitor RIM’s site for security patches and then promptly install them whenever new fixes become available. You can keep track of the various RIM security patches as they’re issued by following me on CIO.com–I posted about RIM’s most recently listed BlackBerry-related security risks here and here–and by bookmarking RIM’s security bulletins page. AS Reuters via CrackBerry.com FREE CIO BlackBerry NewsletterGet better use out of your BlackBerry and keep up-to-date on the latest developments. Sign-up » Related content feature The dark arts of digital transformation — and how to master them Sometimes IT leaders need a little magic to push digital initiatives forward. Here are five ways to make transformation obstacles disappear. By Dan Tynan Oct 02, 2023 11 mins Business IT Alignment Business IT Alignment Business IT Alignment feature What is a project management office (PMO)? The key to standardizing project success The ever-increasing pace of change has upped the pressure on companies to deliver new products, services, and capabilities. And they’re relying on PMOs to ensure that work gets done consistently, efficiently, and in line with business objective By Mary K. Pratt Oct 02, 2023 8 mins Digital Transformation Project Management Tools IT Leadership opinion The changing face of cybersecurity threats in 2023 Cybersecurity has always been a cat-and-mouse game, but the mice keep getting bigger and are becoming increasingly harder to hunt. By Dipti Parmar Sep 29, 2023 8 mins Cybercrime Security brandpost Should finance organizations bank on Generative AI? Finance and banking organizations are looking at generative AI to support employees and customers across a range of text and numerically-based use cases. By Jay Limbasiya, Global AI, Analytics, & Data Management Business Development, Unstructured Data Solutions, Dell Technologies Sep 29, 2023 5 mins Artificial Intelligence Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe