THE WHATIS.COM WORD-OF-THE-DAY June 17, 2004 mobile phone virus
_____________ SPONSORED BY: SearchWebServices.com XML Developer Tip Want to learn a trick or two from an XML expert? Guru and author Ed Tittel provides you with helpful tips and tricks and keeps you up-to-date on the latest XML technology and trends. http://searchwebservices.techtarget.com/tipsIndex/0,289482,sid26_tax285741,00.html?track=NL-34&ad=485279 ______________________ TODAY'S WORD: mobile phone virus Read our complete definition with hyperlinks at http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci970552,00.html?track=NL-34&ad=485279 A mobile phone virus is a computer virus specifically adapted for the cellular environment and designed to spread from one vulnerable phone to another. Although mobile phone virus hoaxes have been around for years, the so-called Cabir virus is the first verified example. The virus was created by a group from the Czech Republic and Slovakia called 29a, who sent it to a number of security software companies, including Symantec in the United States and Kapersky Lab in Russia. Cabir is considered a "proof of concept" virus, because it proves that a virus can be written for mobile phones, something that was once doubted. Cabir was developed for mobile phones running the Symbian and Series 60 software, and using Bluetooth. The virus searches within Bluetooth's range (about 30 meters) for mobile phones running in discoverable mode and sends itself, disguised as a security file, to any vulnerable devices. The virus only becomes active if the recipient accepts the file and then installs it. Once installed, the virus displays the word "Caribe" on the device's display. Each time an infected phone is turned on, the virus launches itself and scans the area for other devices to send itself to. The scanning process is likely to drain the phone's batteries. Cabir can be thought of as a hybrid virus/worm: its mode of distribution qualifies it as a network worm, but it requires user interaction like a traditional virus. Cabir is not considered very dangerous, because it doesn't cause actual damage, and because users can prevent infection by simply refusing to accept suspicious files. However, the virus's code could be altered to create more harmful malware that might, for example, delete any information stored on phones it infects, or send out fake messages purporting to be from the phone's owner. ______________________ RELATED TERMS: virus http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213306,00.html?track=NL-34&ad=485279 cellular http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci211763,00.html?track=NL-34&ad=485279 virus hoax http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213307,00.html?track=NL-34&ad=485279 Bluetooth http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci211680,00.html?track=NL-34&ad=485279 worm http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213386,00.html?track=NL-34&ad=485279 ______________________ SELECTED LINKS: BBC News reports "First mobile phone virus created." http://news.bbc.co.uk/2/hi/technology/3809855.stm The F-secure Antivirus Research Team's blog provides more information, and some screenshots. http://www.f-secure.com/weblog/ The Inquirer has an article called "Bluetooth virus bites mobile phones." http://www.theinquirer.net/?article=16604 _____________________ TODAY'S TECH NEWS: SIEBEL SETS SIGHTS ON RELUCTANT REPS The latest sales force automation tools from Siebel Systems leverage Microsoft's messaging platform in an effort to win the hearts and minds of CRM-skeptical sales professionals. http://searchcrm.techtarget.com/originalContent/0,289142,sid11_gci970504,00.html?track=NL-34&ad=485279 DBMS SALES PUMP UP ORACLE'S Q4 The database giant reports a 15% jump in Q4 profits and a healthy demand for its new 10g DBMS. http://searchoracle.techtarget.com/originalContent/0,289142,sid41_gci970473,00.html?track=NL-34&ad=485279 INTEL OBSTACLES A CHALLENGE FOR MICROSOFT'S VIRTUAL SERVER Intel processors weren't designed with virtualization in mind, which may be one of the reasons that Redmond has taken a while to put together its Virtual Server offering, experts say. http://searchwin2000.techtarget.com/originalContent/0,289142,sid1_gci970487,00.html?track=NL-34&ad=485279 >> Catch up on all the latest IT news at http://searchtechtarget.techtarget.com?track=NL-34&ad=485279 ______________________ WANTED: PET PHOTOS FOR UPCOMING FEATURE We're looking for digital photos of your dog (or other pet) next to your computer. Please include your pet's name, your name, your occupation and e-mail address. Send your photos to: [EMAIL PROTECTED] ______________________ SECRET WORD-OF-THE-DAY This Web site is an attempt to archive the entire contents of the World Wide Web. What is it? http://searchwebservices.techtarget.com/sDefinition/0,,sid26_gci779950,00.html?track=NL-34&ad=485279&offer=SWOD ______________________ GEEK TRIVIA QUESTION OF THE DAY What port number does POP3 mail use? >> Find answer at http://searchcio.techtarget.com/gDefinition/0,294236,sid19_gci514078,00.html?track=NL-34&ad=485279&offer=CIOFACT ______________________ ABBREVIATION QOTD Today's abbreviation: RIP It's classified by the Internet Engineering Task Force as one of several internal gateway protocols. What do the letters in RIP stand for? >> See answer http://searchsmallbizit.techtarget.com/gDefinition/0,294236,sid44_gci214265,00.html?track=NL-34&ad=485279&offer=QOTD ______________________ Richard Petersen's Red Hat Linux quiz Author and IT instructor Richard Petersen tests your knowledge of Red Hat and Fedora administration. http://searchenterpriselinux.techtarget.com/originalContent/0,289142,sid39_gci969850,00.html?track=NL-34&ad=485279 ______________________________ RECENT ADDITIONS AND UPDATES (1) Wikipedia http://whatis.techtarget.com/definition/0,,sid9_gci967853,00.html?track=NL-34&ad=485279 (2) SAN island http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci968351,00.html?track=NL-34&ad=485279&ad=484452 (3) sheepdip http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci799160,00.html?track=NL-34&ad=485279 (4) Transport Services Access Point http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci967867,00.html?track=NL-34&ad=485279 (5) Near Field Communication http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci967849,00.html?track=NL-34&ad=485279&ad=484452 ____________________________________________________________________ ::::::::::::::::::: WHATIS.COM CONTACTS ::::::::::::::::::: MARGARET ROUSE, Site Editor ([EMAIL PROTECTED]) IVY WIGMORE, Consulting Editor ([EMAIL PROTECTED]) LOWELL THING, Consulting Editor and Founder ([EMAIL PROTECTED]) GABRIELLE DERUSSY, Advertising ([EMAIL PROTECTED]) ::::::::::::::::::::: ABOUT THIS NEWSLETTER :::::::::::::::::::::: This e-newsletter is published by WhatIs.com, a targeted Web site from TechTarget, the most targeted IT media and events company. TechTarget offers magazines, Web sites, e-newsletters, Webcasts and conferences for enterprise IT professionals. Copyright 2004 TechTarget. All rights reserved. _____________________________________________________________________ To unsubscribe from "Word of the Day": Go to unsubscribe: http://WhatIs.com/u?cid=485279&lid=430801&track=NL-34 Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed. Contact us: WhatIs Member Services 117 Kendrick Street, Suite 800 Needham, MA 02494
