|
OUSPG[This page is CSS2 enabled. Your browser might not fully support it] Vulnerabilities go mobile$RCSfile: index.html,v $ $Revision: 1.5 $ $Date: 2003/04/29 07:28:51 $ ABSTRACTInformation security incidents plague the Internet. Our society depends on phone networks. Today, the Internet has gone mobile. There will be an inevitable clash between these two worlds. Mobile phones have transformed into interconnected computing appliances and information about their security vulnerabilities begins to roll-in. We explored the vulnerability scene of the mobile phone networks. What would be characteristic to the mobile phone network vulnerabilities? What security problems in mobile phones have been publicly announced? How did WAP implementations survive test-suites constructed to find flaws with security implications? We realised that despite its pecularities, such as patch deployment problems and a lack of real market diversity, the mobile phone vulnerability scene resembles its Internet counterpart. We encourage you to keep-up your security methodology and level of scrunity even in mobile context.
[This page is CSS2 enabled. Your browser might not fully support it] |
||||||