THE WHATIS.COM WORD-OF-THE-DAY 
June 17, 2004

mobile phone virus 

_____________
SPONSORED BY: SearchWebServices.com XML Developer Tip

Want to learn a trick or two from an XML expert? Guru and author Ed
Tittel provides you with helpful tips and tricks and keeps you
up-to-date on the latest XML technology and trends.
http://searchwebservices.techtarget.com/tipsIndex/0,289482,sid26_tax285741,00.html?track=NL-34&ad=485279
 

______________________   
TODAY'S WORD: mobile phone virus 

Read our complete definition with hyperlinks at
http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci970552,00.html?track=NL-34&ad=485279
 

A mobile phone virus is a computer virus specifically adapted for the
cellular environment and designed to spread from one vulnerable phone
to another. Although mobile phone virus hoaxes have been around for
years, the so-called Cabir virus is the first verified example. The
virus was created by a group from the Czech Republic and Slovakia
called 29a, who sent it to a number of security software companies,
including Symantec in the United States and Kapersky Lab in Russia.
Cabir is considered a "proof of concept" virus, because it proves
that a virus can be written for mobile phones, something that was
once doubted. 

Cabir was developed for mobile phones running the Symbian and Series
60 software, and using Bluetooth. The virus searches within
Bluetooth's range (about 30 meters) for mobile phones running in
discoverable mode and sends itself, disguised as a security file, to
any vulnerable devices. The virus only becomes active if the
recipient accepts the file and then installs it. Once installed, the
virus displays the word "Caribe" on the device's display. Each time
an infected phone is turned on, the virus launches itself and scans
the area for other devices to send itself to. The scanning process is
likely to drain the phone's batteries. Cabir can be thought of as a
hybrid virus/worm: its mode of distribution qualifies it as a network
worm, but it requires user interaction like a traditional virus. 

Cabir is not considered very dangerous, because it doesn't cause
actual damage, and because users can prevent infection by simply
refusing to accept suspicious files. However, the virus's code could
be altered to create more harmful malware that might, for example,
delete any information stored on phones it infects, or send out fake
messages purporting to be from the phone's owner. 

______________________
RELATED TERMS:

virus 
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213306,00.html?track=NL-34&ad=485279
 

cellular 
http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci211763,00.html?track=NL-34&ad=485279
 

virus hoax 
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213307,00.html?track=NL-34&ad=485279
 

Bluetooth 
http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci211680,00.html?track=NL-34&ad=485279
 

worm 
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213386,00.html?track=NL-34&ad=485279
 

______________________ 
SELECTED LINKS:

BBC News reports "First mobile phone virus created." 
http://news.bbc.co.uk/2/hi/technology/3809855.stm 

The F-secure Antivirus Research Team's blog provides more
information, and some screenshots. 
http://www.f-secure.com/weblog/ 

The Inquirer has an article called "Bluetooth virus bites mobile
phones." 
http://www.theinquirer.net/?article=16604 

_____________________ 
TODAY'S TECH NEWS:

SIEBEL SETS SIGHTS ON RELUCTANT REPS
The latest sales force automation tools from Siebel Systems leverage
Microsoft's messaging platform in an effort to win the hearts and
minds of CRM-skeptical sales professionals. 
http://searchcrm.techtarget.com/originalContent/0,289142,sid11_gci970504,00.html?track=NL-34&ad=485279
 

DBMS SALES PUMP UP ORACLE'S Q4
The database giant reports a 15% jump in Q4 profits and a healthy
demand for its new 10g DBMS. 
http://searchoracle.techtarget.com/originalContent/0,289142,sid41_gci970473,00.html?track=NL-34&ad=485279
 

INTEL OBSTACLES A CHALLENGE FOR MICROSOFT'S VIRTUAL SERVER
Intel processors weren't designed with virtualization in mind, which
may be one of the reasons that Redmond has taken a while to put
together its Virtual Server offering, experts say.
http://searchwin2000.techtarget.com/originalContent/0,289142,sid1_gci970487,00.html?track=NL-34&ad=485279
 
>> Catch up on all the latest IT news at  
http://searchtechtarget.techtarget.com?track=NL-34&ad=485279

______________________
WANTED: PET PHOTOS FOR UPCOMING FEATURE

We're looking for digital photos of your dog (or other pet) next to
your computer. Please include your pet's name, your name, your
occupation and e-mail address.

Send your photos to: [EMAIL PROTECTED]

______________________
SECRET WORD-OF-THE-DAY 

This Web site is an attempt to archive the entire contents of the
World Wide Web. 
 
What is it?
http://searchwebservices.techtarget.com/sDefinition/0,,sid26_gci779950,00.html?track=NL-34&ad=485279&offer=SWOD
 

______________________
GEEK TRIVIA QUESTION OF THE DAY

What port number does POP3 mail use? 

>> Find answer at
http://searchcio.techtarget.com/gDefinition/0,294236,sid19_gci514078,00.html?track=NL-34&ad=485279&offer=CIOFACT
 

______________________
ABBREVIATION QOTD

Today's abbreviation: RIP 
It's classified by the Internet Engineering Task Force as one of
several internal gateway protocols. What do the letters in RIP stand
for? 

>> See answer
http://searchsmallbizit.techtarget.com/gDefinition/0,294236,sid44_gci214265,00.html?track=NL-34&ad=485279&offer=QOTD
 

______________________
Richard Petersen's Red Hat Linux quiz

Author and IT instructor Richard Petersen tests your knowledge of Red
Hat and Fedora administration. 
http://searchenterpriselinux.techtarget.com/originalContent/0,289142,sid39_gci969850,00.html?track=NL-34&ad=485279

______________________________ 
RECENT ADDITIONS AND UPDATES 

(1) Wikipedia 
http://whatis.techtarget.com/definition/0,,sid9_gci967853,00.html?track=NL-34&ad=485279

(2) SAN island 
http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci968351,00.html?track=NL-34&ad=485279&ad=484452
 

(3) sheepdip
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci799160,00.html?track=NL-34&ad=485279

(4) Transport Services Access Point 
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci967867,00.html?track=NL-34&ad=485279

(5) Near Field Communication
http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci967849,00.html?track=NL-34&ad=485279&ad=484452
 


____________________________________________________________________
:::::::::::::::::::  WHATIS.COM CONTACTS   :::::::::::::::::::

MARGARET ROUSE, Site Editor ([EMAIL PROTECTED])

IVY WIGMORE, Consulting Editor ([EMAIL PROTECTED])

LOWELL THING, Consulting Editor and Founder ([EMAIL PROTECTED])

GABRIELLE DERUSSY, Advertising ([EMAIL PROTECTED])

:::::::::::::::::::::  ABOUT THIS NEWSLETTER  ::::::::::::::::::::::
This e-newsletter is published by WhatIs.com, a targeted Web site
from TechTarget, the most targeted IT media and events company.
TechTarget offers magazines, Web sites, e-newsletters, Webcasts and
conferences for enterprise IT professionals.
Copyright 2004 TechTarget. All rights reserved.
_____________________________________________________________________

To unsubscribe from "Word of the Day":
 
Go to unsubscribe: http://WhatIs.com/u?cid=485279&lid=430801&track=NL-34
 
Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.
 
Contact us:
WhatIs
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

Reply via email to