Mobile Phones as Computing Devices: The Viruses are Coming!
Abstract
Imagine this scenario: Paul, the CTO of WidgetCo, visits BadCo, a rival company. Paul attends a private dinner at BadCo's headquarters to discuss a possible cooperative venture. While there, BadCo's industrial espionage team uses Bluetooth to infect Paul's mobile phone with a program that turns it into a listening device. BadCo can call Paul's phone without it ringing, and Paul's phone automatically answers, letting BadCo eavesdrop on what's occurring in Paul's environment through his phone's microphone. BadCo uses this ability to spy on Paul's later meetings at WidgetCo and steal the venture for themselves.
- Publication:
-
IEEE Pervasive Computing
- Pub Date:
- 2004
- DOI:
- Bibcode:
- 2004IPCom...3d..11D
- Keywords:
-
- Mobile handsets;
- Computer viruses;
- Protection;
- Internet;
- Analog computers;
- Telephone sets;
- Computer networks;
- Computer worms;
- Mobile computing;
- Taxonomy;
- bluebugging;
- mobile phones;
- malware