As I have discussed in previous columns, the technology is moving so fast and upgrading with such incredible speed that it is hard to keep up with it and this is not going to change.It should also be very clear that with each new device thrust onto the market, there are new abilities and applications that the devices can perform as well.
Now when it comes to a cellphone, if you look at the number of them that exist and the features and abilities they contain, the “perks” if you will, it stands to reason that the once free from attack cellphone is now open to being invaded with viruses and other naughty illnesses, just like your PC and Laptop.
You see, all of the new features and abilities that are in cellphones are the result of new algorithms, which in mathematics and computer science is an effective method expressed as a finite list of well-articulated instructions for calculating a function.
Algorithms are used for calculation, data processing and automated reasoning of all processes that are performed by and within your cellphone.
With all of the new phone technology to include information technology in general, there is a basic rule of thumb that should be followed: Do not blindly believe in the effectiveness of new algorithms that are finding their way into phones, simply because they have not been tested beyond a certain point in the actual environment we call everyday life.
In short, guard well your personal information when putting it into your phone and don’t be misled by the excitement of having a great new gadget that is loaded with new features and applications, because there may be hidden weaknesses and vulnerabilities that your phone will fall prey to, creating untold problems in your life.
Another highly ignored aspect of cellphone ownership is the fact that they are more compact and therefore easier to lose or to have stolen.
In this regard, it is important to make sure your phone is password protected and that the password you use is both complex and easy for you to remember.
You see, in having the phone password protected, you will ensure that whoever finds it or takes it will only have the hardware and not the information contained within it.
Did I just hear someone ask the question, “What about big brother?”
Great question! Well, just remember that when you’re making a call from your phone, that causes your phone to initiate the process of finding a local tower to establish the wireless connection needed to make the call happen.
Once this process is in place, it is easy for organizations that we all know of and usually have three letters in their names to become aware of your movements and, in many cases, even listen in on your conversations.
If you doubt this, just think about the obvious situation of calling 9-1-1 and the fact that if you are unable to give them your actual, physical coordinates, they can, by way of a triangulation process that involves the towers to include your phone’s built-in GPS, pinpoint your location.
You should also remember the past governmental involvement in tapping into the phones of U.S. citizens that were suspected of having possible ties to terrorist groups and listening to their ongoing conversations.
Now this should not be unsettling to you unless you’re doing something or involved in something that puts you on the radar of those security agencies that I spoke of earlier.
Next week we’ll look at the final array of issues that you should be aware of when dealing with your phone’s security and the information contained within it.
Oh, and by the way, I really hope that you’re not wrapping your head and phone with aluminum foil to keep the hackers out; but if you are, please send me a picture and I promise not to put it on Facebook.
Andino Ward is vice president of marketing and operations of Bardissi Enterprises in Hatfield. Bardissi Enterprises welcomes your questions or comments. Questions you would like answered or topics you would like discussed should be sent to Andino R. Ward at award@bardissi.net. You can also visit www.bardissi.net, or call (215) 853-2266.
Monday, February 28, 2011
Friday, February 25, 2011
Are cellphone viruses fact or fiction?
I was traveling through Amish country a week ago and I had the urge for some Amish baked goods. So I stopped at one of the local stores and never even got the sweet treat I went in for.
Instead, I was totally amazed at the fact that standing in front of me were several Amish gentlemen and they all had smartphones.
I was stunned and quite amazed as I thought that the Amish wanted nothing to do with the things of technology.
So, being the curious person that I am, I waited until one Amish gentleman was finished talking on the phone and I politely asked him about his use of the smartphone and when it became acceptable for the Amish to venture into the realm of technology.
I won’t bore you with the details of our conversation, which to me was very interesting. Maybe I’ll do a column on that another time.
During my conversation with the Amish gentleman I told him that I was in the information technology business. He asked a very interesting question, which was, “Can a cellphone be hacked and get a virus”?
Well, I tell you I was both amazed at his question and impressed, but I had no answer for him as I really didn’t know if either situation was possible.
So I told him that I would not only research the matter, but I would e-mail him the answer as well.
Thus, I am now taking you on a journey to answer the Amish gentleman’s question.
In order to answer the question of whether a cell phone can get a virus, one must first accept the fact that the cell phone, of today, also referred to as a smartphone is a very compact computer that has almost all of the abilities that your PC or laptop has and more, since you can dial and engage in conversation with anyone, anywhere, at any time provided you have five bars.
Now it should be very obvious that if the cell phone is a computer then it stands to reason that it can be afflicted with a virus.
We must also consider that the taste buds of the ominous hackers, out there in the world, have become tantalized with the thought of a whole new universe that is waiting to be plundered and pillaged by them.
A virtual hacker’s smorgasbord, the next frontier and you can best believe that they are on the hunt for big game.
In researching this subject, I was shocked to find that there are a tremendous amount of viruses designed specifically to attack a cell phone.
Yet, I personally have not encountered any of these viruses or I have and just didn’t realize that the problem was virus related.
One of the viruses that can infect your cell phone makes hidden phone calls to very expense phone lines, unbeknownst to you as the hacker is able to embed a hidden virus that will reveal when you are not using the phone allowing the hacker to initiate a call sequence without your knowledge.
There is another virus that can cause your cell phone to transmit very pricy SMS messages, again without your knowledge and consent.
This next virus is one that I think I might have experienced as well as a few of my friends and family members too.
This virus effects the cell phone battery and can cause it to drain faster than usual which can lead one to believe that the battery is defective when it really isn’t.
This has happened to me on several occasions, with brand-new batteries, making me replace them, only to find that the old battery was fine.
If this should ever happen to you, make sure that you take the battery out of your phone, recharge it and try it in another phone.
This will tell you if the battery is defective or if you are the possible victim of a hacker.
There are things that one can do to protect their cell phone from being hacked, as well as other areas of concern that cell phone users should be aware of and we will look at the solution and other concerns next week.
Andino Ward is vice president of marketing and operations of Bardissi Enterprises in Hatfield. Bardissi Enterprises welcomes your questions or comments. Questions you would like answered or topics you would like discussed should be sent to Andino R. Ward at award@bardissi.net. You can also visit www.bardissi.net, or call (215) 853-2266.
Instead, I was totally amazed at the fact that standing in front of me were several Amish gentlemen and they all had smartphones.
I was stunned and quite amazed as I thought that the Amish wanted nothing to do with the things of technology.
So, being the curious person that I am, I waited until one Amish gentleman was finished talking on the phone and I politely asked him about his use of the smartphone and when it became acceptable for the Amish to venture into the realm of technology.
I won’t bore you with the details of our conversation, which to me was very interesting. Maybe I’ll do a column on that another time.
During my conversation with the Amish gentleman I told him that I was in the information technology business. He asked a very interesting question, which was, “Can a cellphone be hacked and get a virus”?
Well, I tell you I was both amazed at his question and impressed, but I had no answer for him as I really didn’t know if either situation was possible.
So I told him that I would not only research the matter, but I would e-mail him the answer as well.
Thus, I am now taking you on a journey to answer the Amish gentleman’s question.
In order to answer the question of whether a cell phone can get a virus, one must first accept the fact that the cell phone, of today, also referred to as a smartphone is a very compact computer that has almost all of the abilities that your PC or laptop has and more, since you can dial and engage in conversation with anyone, anywhere, at any time provided you have five bars.
Now it should be very obvious that if the cell phone is a computer then it stands to reason that it can be afflicted with a virus.
We must also consider that the taste buds of the ominous hackers, out there in the world, have become tantalized with the thought of a whole new universe that is waiting to be plundered and pillaged by them.
A virtual hacker’s smorgasbord, the next frontier and you can best believe that they are on the hunt for big game.
In researching this subject, I was shocked to find that there are a tremendous amount of viruses designed specifically to attack a cell phone.
Yet, I personally have not encountered any of these viruses or I have and just didn’t realize that the problem was virus related.
One of the viruses that can infect your cell phone makes hidden phone calls to very expense phone lines, unbeknownst to you as the hacker is able to embed a hidden virus that will reveal when you are not using the phone allowing the hacker to initiate a call sequence without your knowledge.
There is another virus that can cause your cell phone to transmit very pricy SMS messages, again without your knowledge and consent.
This next virus is one that I think I might have experienced as well as a few of my friends and family members too.
This virus effects the cell phone battery and can cause it to drain faster than usual which can lead one to believe that the battery is defective when it really isn’t.
This has happened to me on several occasions, with brand-new batteries, making me replace them, only to find that the old battery was fine.
If this should ever happen to you, make sure that you take the battery out of your phone, recharge it and try it in another phone.
This will tell you if the battery is defective or if you are the possible victim of a hacker.
There are things that one can do to protect their cell phone from being hacked, as well as other areas of concern that cell phone users should be aware of and we will look at the solution and other concerns next week.
Andino Ward is vice president of marketing and operations of Bardissi Enterprises in Hatfield. Bardissi Enterprises welcomes your questions or comments. Questions you would like answered or topics you would like discussed should be sent to Andino R. Ward at award@bardissi.net. You can also visit www.bardissi.net, or call (215) 853-2266.
Monday, February 7, 2011
Tips for taming the IT monster
So how many of you, after reading the first part of this series, found a technology group to join, or invited your company’s IT person or persons over for a nice, home-cooked meal in an effort to solidify a new friendship?
Well, if neither of those was appealing to you, here are some more ways in which you can get a hold on the fast-paced, always changing world of information technology.
Another good source of help in understanding the technology is to find a good class or workshop that offers ongoing education in the area of the current and future technologies along with information on how to use it as well.
You can find these types of programs at your community high school if they offer adult education classes.
This is also something that you can find at the local community college as well.
If you looking at not really spending any money, then I would suggest you go to the Web, as you will find an incredible amount of free information and even video tutorials that are ongoing and informative in the area of new technology and how it works. A lot of the tutorials have online groups associated with them, which will connect you with others who have a wealth of knowledge and information that can be beneficial to you and help you stay up on what’s happening in the IT realm.
It is good to select a specific periodical that is all about information technology and read it, whenever you can. These publications are another great source of information that will keep you up to date on information technology and you can either subscribe to them or go online and visit their websites to read the latest trends and happenings in the IT world.
There are at least 10 very popular publications on the market and several of them have television shows to coincide with them. Some of my favorites are PC World, PC Magazine, MacWorld and CNET. The information that you will get from these magazines and their websites is not only informative, but cutting edge as well, since they are always featuring and discussing the next big thing or service that is going to hit the market.
Because of the rapid-fire creation and release of new technology, many people suffer from technology anxiety and overload as they are continually trying to figure out whether to keep their current device or application verses moving to the new technology that they are being bombarded with on a daily basis.
There is no place where this is more evident than in the smartphone market. The way to avoid overload and anxiety is simple. If you are a business owner or a company IT person, you need only ask yourself, “Is this new technology something that will help our users do their job better and will it cut cost and be compatible with our third party software and applications?”
If you’re a private citizen, it is a lot easier to answer the question as you are usually looking at new technology for personal use, which does not require the same level of scrutiny as does a business.
Most personally used technology is purchased more for its entertainment value and ability, all of which can be directed by asking the simple question, “What really floats my boat in the area of technology that I am looking for and are the features I want contained in the technology I am thinking of getting?”
Finally, get yourself or your organization involved in technology news groups, which can be found on the Web. Create your own information technology file and add any and all information that you come across on new technology so that you can go back and read about it or talk to others, who are in the know about it.
Try to attend technology conventions or shows to get familiar with the manufacturers of the technology and get on their e-mail list.
Whatever you do, don’t be afraid of or overwhelmed by the information technology juggernaut.
Remember, the technology should not control you, but instead you should control the technology and the way to do that is by being informed and understanding what you need versus what you may think you want.
Andino Ward is vice president of marketing and operations of Bardissi Enterprises in Hatfield. Bardissi Enterprises welcomes your questions or comments. Questions you would like answered or topics you would like discussed should be sent to Andino R. Ward at award@bardissi.net. You can also visit www.bardissi.net, or call (215) 853-2266.
Subscribe to:
Comments (Atom)