I would refer you to a document post by Michael Burnette ([EMAIL PROTECTED]) on july 2. Very interesting...
>>For those of you that wish to view it, I have posted my white paper on Blackberry forensics to a website. >>I should have emailed a copy already to anyone that requested it; this version is no different. I have >>included a date on the document as I do intend to keep this as a living publication. Hope this helps. >>http://www.rh-law.com/ediscovery/Blackberry.pdf >>Thanks, >>Michael Burnette >>Director of I.T. >>Rogers & Hardin LLP -----Message d'origine----- De : Brizendine, Erik [mailto:[EMAIL PROTECTED]] Envoyé : 5 juillet, 2002 15:39 À : Gino Genari Cc : [EMAIL PROTECTED] Objet : RE: Blackberry/Wireless devices Be sure to use a password to restrict access to the 'crackberry. If the device is lost it is easy enough to stop the flow of emails to the handheld, but it takes Blackberry.net two days to shutdown the device's ability to send emails. If you have a password enabled, after 10 bad tries the Blackberry will lock the screen. There is also no way to remotely empty a device of information. Again, use a password. There are 3rd party programs available to allow you to read word documents, etc. These programs require you to send the attachment to another company's server to make the translation. I haven't found a program that would run on my server. I am probably just being paranoid. Too bad. Afaik the transmission is the same as a cell phone. Digital. No hacks I'm aware of, but I will follow the thread. :) Erik - @ zyomyx.com -----Original Message----- From: Gino Genari [mailto:[EMAIL PROTECTED]] Sent: Friday, July 05, 2002 8:07 AM To: [EMAIL PROTECTED] Subject: Blackberry/Wireless devices Can anyone tell me what security concerns there are with the Blackberry devices or Pocket PC's? I am not concerned with the firewall piece of the puzzle (except for any additional ports that are needed to be opened). At this point I am mostly concerned with the sniffing of transmissions, or the hacking of the devices themselves. Thanks, Gino