How the FBI collars cybercriminals

28.07.2006

Day: Mobile computing is starting to be the big concern, with thefts of customer lists or intellectual property. The fact that laptops, PDAs and cell phones are so easily lost, the fact that they often have Bluetooth and other types of technologies, the fact that employees don't understand the risks. I could walk right by you and connect to your PDA and be reading all of your files if you don't have it locked down. It's a technology that's advancing very rapidly.

How are handhelds and cell phones compromised?

Day: You can compromise a cell phone so that you can turn it on whenever you want, and the conversations going on around you can be transmitted to whoever is controlling the cell phone. If I had your cell ... and I made a single phone call, I could download a program to the cell phone that would make the cell phone controllable.

How do you prevent that?

Day: Never let anyone use your cell phone. Honestly, you can't let people borrow your cell phone unless you know who the person is.