Chief security scientist says with technology, like mobile phones, being used for more purposes, beware of misuse and negative consequences.
SACRAMENTO, Calif. -- The convergence of devices -- like cell phones, PDAs and pagers being combined into one -- can lead to misuse and unintended consequences, said Kevin Kealy, chief security scientist of AT&T Labs, at the Conference on California's Future in Sacramento. The more devices that are combined into one piece of technology, the more unintended consequences will follow.
Kealy gave the example of people hacking Apple iPhones to run programs like the operating system Linux. Using Linux on the iPhone isn't an original purpose for having the mobile device, but it has become an unintended use.
Kealy said data networks being changed to handle other functions, like carrying fax and voice traffic, is another new technology that can have negative consequences. Although voice over Internet protocol (VoIP) can offer cost savings, don't forget the vulnerabilities that come along with it. For example, he said many people assume VoIP works like a traditional phone. However, it actually works like a computer, and many VoIP phones aren't encrypted, so anyone with the right tools can listen to conversations.
When California instituted the Wireless Communications Device Law that required drivers 18 and older to use a hands-free device when talking on their cell phones while driving, many people turned to Bluetooth devices, which allow electronic devices to communicate wirelessly. Many people may not think about how secure their conversations are when using a Bluetooth device.
Kealy said the devices run on the same frequency as Wi-Fi and usually have a 150-foot range, making it easy for people to hack in and listen to conversations. He warned government users to never discuss anything expensive, confidential or embarrassing when using a Bluetooth device.
Attackers also can download the last-called list or contact list from a mobile phone without users' knowledge or consent. Kealy said this happens so frequently that it has been termed "War nibbling." Attackers also can access mobile phones through Bluetooth to make outgoing calls and send text messages from an unsuspecting person's phone number.
He said the newer versions of Bluetooth are addressing security issues, but users must be careful.
Other security tips Kealy offered include:
"Every layer of security will keep somebody out," Kealy said. He added later, "Nothing that you do will ever be 100 percent effective."