I would refer you to a document post by Michael Burnette ([EMAIL PROTECTED]) on
july 2.  Very interesting...

>>For those of you that wish to view it, I have posted my white paper on
Blackberry forensics to a website.
>>I should have emailed a copy already to anyone that requested it; this
version is no different.  I have
>>included a date on the document as I do intend to keep this as a living
publication.  Hope this helps.

>>http://www.rh-law.com/ediscovery/Blackberry.pdf

>>Thanks,
>>Michael Burnette
>>Director of I.T.
>>Rogers & Hardin LLP


-----Message d'origine-----
De : Brizendine, Erik [mailto:[EMAIL PROTECTED]] 
Envoyé : 5 juillet, 2002 15:39
À : Gino Genari
Cc : [EMAIL PROTECTED]
Objet : RE: Blackberry/Wireless devices


Be sure to use a password to restrict access to the 'crackberry.

If the device is lost it is easy enough to stop the flow of emails to the
handheld, but it takes Blackberry.net two days to shutdown the device's
ability to send emails.  If you have a password enabled, after 10 bad tries
the Blackberry will lock the screen.

There is also no way to remotely empty a device of information.  Again, use
a password.

There are 3rd party programs available to allow you to read word documents,
etc.  These programs require you to send the attachment to another company's
server to make the translation.  I haven't found a program that would run on
my server.  I am probably just being paranoid. Too bad.

Afaik the transmission is the same as a cell phone.  Digital.

No hacks I'm aware of, but I will follow the thread. :)

Erik                                    -
@
zyomyx.com



-----Original Message-----
From: Gino Genari [mailto:[EMAIL PROTECTED]] 
Sent: Friday, July 05, 2002 8:07 AM
To: [EMAIL PROTECTED]
Subject: Blackberry/Wireless devices



Can anyone tell me what security concerns there are with the Blackberry
devices or Pocket PC's? I am not concerned with the firewall piece of the
puzzle (except for any additional ports that are needed to be opened).

At this point I am mostly concerned with the sniffing of transmissions, or
the hacking of the devices themselves.


Thanks,

Gino

Reply via email to