Subject: | |
From: | |
Reply To: | |
Date: | Tue, 18 Jan 2011 14:44:32 -0800 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
I think Julie has the correct reaction. Any exploit of this hack is likely going
to be set up in a locale where there is a high likelihood of obtaining valuable
information, such as in a very densely populated area, at or near a location of
a significant meeting of powerful people (think one of Bill Clinton's Foundation
meetings in NYC). Other targets could be defense contractors and public
accounting firms. Imagine the value in overhearing a cell phone conversation
between executives or board members at Apple last week, just before Steve Jobs
announced his medical leave.
The hack is technically difficult, but the same sort of hack has been around for
a while with standard cell phone. If you can get physical custody of a cell
phone, you can usually install software that will do the same thing. Likewise,
you might be able to trick someone into following a malicious URL for a similar
outcome. An open Bluetooth connection can also be exploited (so never leave your
phone or any other Bluetooth-enabled device (especially your laptop) as
"discoverable" (you'd be surprised how many are out there).
The good news (I hope) is that the difficulty of the hack should buy time for
the various manufacturers to start patching existing devices and coding new
devices to avoid the problem.
Patrick Cunningham, CRM, FAI
[log in to unmask]
"Perpetual optimism is a force multiplier."
-- Colin Powell
List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]
|
|
|