Menu
News
All News
Dungeons & Dragons
Level Up: Advanced 5th Edition
Pathfinder
Starfinder
Warhammer
2d20 System
Year Zero Engine
Industry News
Reviews
Dragon Reflections
White Dwarf Reflections
Columns
Weekly Digests
Weekly News Digest
Freebies, Sales & Bundles
RPG Print News
RPG Crowdfunding News
Game Content
ENterplanetary DimENsions
Mythological Figures
Opinion
Worlds of Design
Peregrine's Nest
RPG Evolution
Other Columns
From the Freelancing Frontline
Monster ENcyclopedia
WotC/TSR Alumni Look Back
4 Hours w/RSD (Ryan Dancey)
The Road to 3E (Jonathan Tweet)
Greenwood's Realms (Ed Greenwood)
Drawmij's TSR (Jim Ward)
Community
Forums & Topics
Forum List
Latest Posts
Forum list
*Dungeons & Dragons
Level Up: Advanced 5th Edition
D&D Older Editions, OSR, & D&D Variants
*TTRPGs General
*Pathfinder & Starfinder
EN Publishing
*Geek Talk & Media
Search forums
Chat/Discord
Resources
Wiki
Pages
Latest activity
Media
New media
New comments
Search media
Downloads
Latest reviews
Search resources
EN Publishing
Store
EN5ider
Adventures in ZEITGEIST
Awfully Cheerful Engine
What's OLD is NEW
Judge Dredd & The Worlds Of 2000AD
War of the Burning Sky
Level Up: Advanced 5E
Events & Releases
Upcoming Events
Private Events
Featured Events
Socials!
EN Publishing
Twitter
BlueSky
Facebook
Instagram
EN World
BlueSky
YouTube
Facebook
Twitter
Twitch
Podcast
Features
Top 5 RPGs Compiled Charts 2004-Present
Adventure Game Industry Market Research Summary (RPGs) V1.0
Ryan Dancey: Acquiring TSR
Q&A With Gary Gygax
D&D Rules FAQs
TSR, WotC, & Paizo: A Comparative History
D&D Pronunciation Guide
Million Dollar TTRPG Kickstarters
Tabletop RPG Podcast Hall of Fame
Eric Noah's Unofficial D&D 3rd Edition News
D&D in the Mainstream
D&D & RPG History
About Morrus
Log in
Register
What's new
Search
Search
Search titles only
By:
Forums & Topics
Forum List
Latest Posts
Forum list
*Dungeons & Dragons
Level Up: Advanced 5th Edition
D&D Older Editions, OSR, & D&D Variants
*TTRPGs General
*Pathfinder & Starfinder
EN Publishing
*Geek Talk & Media
Search forums
Chat/Discord
Menu
Log in
Register
Install the app
Install
Upgrade your account to a Community Supporter account and remove most of the site ads.
Rocket your D&D 5E and Level Up: Advanced 5E games into space! Alpha Star Magazine Is Launching... Right Now!
Community
General Tabletop Discussion
*Geek Talk & Media
the tablet war is heating up
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="Banshee16" data-source="post: 5617596" data-attributes="member: 7883"><p>That's all I'm saying.</p><p></p><p>And I'm not saying that Apple products are the only ones needing protection. The difference (that I see) is that it seems like Apple doesn't really encourage security awareness. I've read articles that Apple has actually denied there being problems, when meanwhile customers were getting hit by an exploit.</p><p></p><p>RiM at the very least includes firewall software, and has built their reputation on the security measures they put in place in their devices.</p><p></p><p>I *did* find this article, listing open ports used by Apple devices (including iPhone 4).</p><p></p><p><a href="http://support.apple.com/kb/ts1629" target="_blank">Well known TCP and UDP ports used by Apple software products</a></p><p></p><p>Seems like a lot more than 1 open port.....though I'm not a networking expert, and I don't know if all of those are used by iOS 4, or just one or two of them.</p><p></p><p>I'll try to find that other article. It was a conjecture piece by a consultant talking about security concerns regarding the newer generations of smartphones. It wasn't pointing out (that I remember) a specific threat active in the wild. So maybe it was a fluff piece. I don't know. I *do* know that most of the guys that I know in network security *have* expressed similar concerns with the security (or lack thereof) in mobile devices (and WiFi, period).</p><p></p><p>I think what becomes more of a concern is when you start seeing reports of potentially government-sponsored hacking and such, and the appearance of things like Stuxnet, which, from my understanding depended on a component that could infect things like thumbdrives, and then move from those thumb drives to the computers *inside* a nuclear installation, when inserted into computers inside the facility (since those computers weren't actually connected to the internet, due to security), one has to wonder if eventually smartphones could be used to perpetrate a really bad attack or infection somewhere.....virus infects server, is downloaded to smartphone, smartphone connects to network inside a secure facility (or is docked to a PC or whatever), and then passes the infection along. I think that's the kind of nightmare scenario they're talking about.</p><p></p><p>The article referenced the idea that the more powerful processors, and greater memory on the newer devices could theoretically give one of these devices enough power that you could have a scenario where (for instance), a guy with an infected phone goes to a Starbucks for a coffee. He has WiFi on. He connects to Starbucks (since the same login credentials seem to be used at all locations), and his phone then infects the router, and/or infects the mobile devices of all other users connected to that hotspot at the time. They then go their separate ways, infect their own home networks, infect other Starbucks locations, etc. etc. etc.</p><p></p><p>It was an article about a year ago. Might be a little tricky to find, but I'll see what I can do.</p><p></p><p>Could a phone be used, theoretically, to launch DOS attacks, for instance? Do they have enough computer power?</p><p></p><p>If they have a lower level of security than an AV protected, firewalled, router-protected PC, and they become more prevalent, then you've effectively got a rapidly growing population of devices with increasing computer power, but little security. Seems to me, it would be a hacker's paradise.</p><p></p><p>Banshee</p></blockquote><p></p>
[QUOTE="Banshee16, post: 5617596, member: 7883"] That's all I'm saying. And I'm not saying that Apple products are the only ones needing protection. The difference (that I see) is that it seems like Apple doesn't really encourage security awareness. I've read articles that Apple has actually denied there being problems, when meanwhile customers were getting hit by an exploit. RiM at the very least includes firewall software, and has built their reputation on the security measures they put in place in their devices. I *did* find this article, listing open ports used by Apple devices (including iPhone 4). [url=http://support.apple.com/kb/ts1629]Well known TCP and UDP ports used by Apple software products[/url] Seems like a lot more than 1 open port.....though I'm not a networking expert, and I don't know if all of those are used by iOS 4, or just one or two of them. I'll try to find that other article. It was a conjecture piece by a consultant talking about security concerns regarding the newer generations of smartphones. It wasn't pointing out (that I remember) a specific threat active in the wild. So maybe it was a fluff piece. I don't know. I *do* know that most of the guys that I know in network security *have* expressed similar concerns with the security (or lack thereof) in mobile devices (and WiFi, period). I think what becomes more of a concern is when you start seeing reports of potentially government-sponsored hacking and such, and the appearance of things like Stuxnet, which, from my understanding depended on a component that could infect things like thumbdrives, and then move from those thumb drives to the computers *inside* a nuclear installation, when inserted into computers inside the facility (since those computers weren't actually connected to the internet, due to security), one has to wonder if eventually smartphones could be used to perpetrate a really bad attack or infection somewhere.....virus infects server, is downloaded to smartphone, smartphone connects to network inside a secure facility (or is docked to a PC or whatever), and then passes the infection along. I think that's the kind of nightmare scenario they're talking about. The article referenced the idea that the more powerful processors, and greater memory on the newer devices could theoretically give one of these devices enough power that you could have a scenario where (for instance), a guy with an infected phone goes to a Starbucks for a coffee. He has WiFi on. He connects to Starbucks (since the same login credentials seem to be used at all locations), and his phone then infects the router, and/or infects the mobile devices of all other users connected to that hotspot at the time. They then go their separate ways, infect their own home networks, infect other Starbucks locations, etc. etc. etc. It was an article about a year ago. Might be a little tricky to find, but I'll see what I can do. Could a phone be used, theoretically, to launch DOS attacks, for instance? Do they have enough computer power? If they have a lower level of security than an AV protected, firewalled, router-protected PC, and they become more prevalent, then you've effectively got a rapidly growing population of devices with increasing computer power, but little security. Seems to me, it would be a hacker's paradise. Banshee [/QUOTE]
Insert quotes…
Verification
Post reply
Community
General Tabletop Discussion
*Geek Talk & Media
the tablet war is heating up
Top