Show p— I i C8— The Herald Journal Logan Utah Wednesday March 20 200? tfair vDra® pDi)M®s ac® iraejtti ©®0D Japan Europe already dealing with attacks NEW YORK (AP) — For malicious computer hackers and virus writers the next frontier in mischief is the mobile phone A phone virus or ‘Ttojan horse” program might instruct your phone to do extraordinary things computer security experts say It might call the White House or ' the police with a bizarre hoax It might forward your personal address book to a sleazy telemarketing firm Or it could simply eat into the phone's operating software shutting it down and erasing your personal information Similar nasty hijinks have already dogged cell phone owners in Japan and Europe “If a malicious piece of code gets control of your phone it can do everything you can do” said Ari Hypponen chief technical officer of Helsinki-base- d Corp a ' computer security firm “It can call toll numbers It can get your messages and send them elsewhere It can record your passwords” As cellular phones morph into computer-lik- e “smartphones” able to and surf the Web send load software they’re prone to the same tribulations that have waylaid computers over the past decade “We should think of cell phones as just another set of computers oq the Internet” said Stephen Trilling director of research at antivirus software maker Symantec Corp “If they’re connected to the Internet they dan be used to transmit threats and attack targets just as any computer can It’s technically possible right now" In Japan deviant messages sent to cell phones contained an Internet link that when clicked ' caused phones to repeatedly dial the national emergency number — equivalent to 91 1 The wireless earn-- : er halted all emergency calls until the bug was removed In Europe handsets’ short' message service or SMS has been used to randomly send pieces of binary code that crashes phones forcing the user to detach the battery and reboot A new more sinister version keeps ail Continued from Cl buzz phrase Microsoft says the technolo- gy powering displays from a variety of manufacturers including Philips and LG Electronics should be on the market by Christmas with the smallest units selling for around $500 Liberating notebook users from cramped typing positions is the idea behind the Pace- $ook Its display and keyboard are separate though they can be held together by ' the device’s case ” TaiwanThe product by based PaceBlade lets users position the keyboard wherev- er they want including in por-trait rather than traditional landscape mode good for reading Web pages “There are a tot of mechani- ‘cal issues with PCs” said PaceBlade director of capo- rate development Michael f - Lim “For instance hinges ' fail Here there is no hinge” An infrared connection lets users position the keyboard anywhere and the touch-sesitive screen means information can be entered with a ' stylus or keyboard Other design tweaks: rubber doors for device ports instead of file plastic ones that tend to " break and a ‘thick clear panel protecting the LCD screen The machine sells for about $2 1 00 ' For Palm PDA users Loj itech offers a waterproof ric keyboard that wraps the Palm to double as iv- -: around v a case ' Logitech’s urppean public ' relations manager Ganpth jlayes splqshed a soft drink on it to oemonstrale the sticky stuff dribbled offwifii- r put leaving a ttain The $100 vVdevice which ships inApril !' 'Yl felt a little cramped and i sfoweddowntypingspred rampared to mdre convention' al folding keyboards show This y ear’s alo fea ' tures a bevy pf devices that doutte as mobile phones and - code gets control of your phone it can do everything you can do" ' Captain Crunch for pioneering the hacking of phone networks with the help of a plastic whistle that came in a box of the eponymous breakfast cereal '' cyber-space- tricks is one such Hypponen's firm selling antivirus and encryption software for srhartphone operating systems made by Palm Microsoft and the Symbian platform common in Europe Thus far there have been no publi- -' cized reports of phone hacking or viruses although viruses have attacked handhelds running the Palm operating system Microsoft predicts deviant code will soon emerge for handhelds running its Pocket PC Crunch-style ail y ' 1 icimntl f great picture soundB atMUrai -- SORCERERS STONE Daily &S5 7:00 n ' : v DrityftW ’“We are starting Cell Phone Virus Challenge Any contribution welcomed’" Hypponen quoted the notice as saying The page has since been taken down Soon mobile phone owners will be obliged to install security software like “personal firewalls” that used to be reserved for Internet servers said Prakash Panjwani a senior vice president at Certfcom Corp! a computer security firm in Hayward Calif- ail -- rt "V si!’: 1 j y C tS V 2450 North Main AP photo with his CrunchBox security appliance as he uses a portable John Draper sits phone at his office in Stockton Calif Draper once known as Captain Crunch was a “phone phreakei” in the 70s and now designs computer security software “That’s where filings are going” said Panjwani “It’s the same threat as the wired world: people posing as you stealing your identity or your personal information and using your trade-offs- information foe malicious purposes” Cell phone users can avoid this of course by sticking with their old USU hoops team thank you fra working with these athletes and putting in countless hours coaching and teaching these players To the athletic department thank you fra all the behind the scenes work that made attending basketball games enjoy- had great season To the editor I would like to fiiank the USU men’s basketball team coaches and athletic department for this past season May you all remember the highk learn from file lows and hold your able heads high as representatives of the Aggies and of file Big West regular season Conference To the basketball players thank you for devoting your time and talent Good luck in the classroom and to those graduating good luck in your future endeavors To the coaching staff MSjvfc'oM!-- - Alt: ( I my wife and my children (along with countless others) enjoyed attending games this year and look forwatd to next season when we get to cheer on the Aggie basketball team once again Again fiiank you Craig J Peterson Logan H’ I' tender m vmm r O' if Cl stfcVA - so-u- i 7t6 MS SaiSinMB Count Of AAonla Grfato MDbSfai2flS pui Dragonfly a30 700M0ba&n2lb Alt wu HI soon iraa auai5MSM21S ris N Main 75: “dumb” phones said Alan Reiter a wireless consultant in Chevy Chase Md ” said Reiter “There are “Do you want a phone with a tiny' monochrome screen where you can only make phone calls? That’s much more secure” leu Aaara 43f ni035M&iiU) Thu Tima AAochiiw 60 WmI 100 Showtime 630 700 MO Sal S jun 210 ImovIe hotune i Thanks to you Kljf-Ju- ICC AGE : SI - Sot 12 2297 " J' t sk - tUB 713 Qaorga Gtodnsy JuHa Robots OCEANS BBBfpwm r : r1 viriises ' phones personal computers or PDAs The pen using a technology developed by Sweden’s Anoto records handwriting strokes on special paper with microdots that let the pen orient itself An image of the note pops up on foe other person’s screen when they open the The data is sent to the phone through a tiny transmitter The company says the pen adds a personal touch and eases messaging in languages that don’t use the Latin alpha- bet that dominates computer keyboards ' For now you need an Ericsson phone to use it it’s on sale in Sweden for $220 Hie com' pany says it willintroduce it in other European countries this year and eventually inthe United States CHILDREN $2001 W o7ZrV V llnitftjm HARRY POTTER AND THE on-scre- en - ' r UTAHS752T3072 n- ' third-part- “You could control the entire net- work do anything an operator could do” Draper said Now at least three software companies have released personal security software for emerging smartphones girding for a new wave of phone viruses and Captain SEATS GREAT V i Trium-Mond- Corp E ' third-part- - Arl Hypponen 1300 J f? s full-fledg- ed “If a malicious piece of ' v self-replicat-es 66 ail - software Both operating systems are expected to be used increasingly in smartphones A virus is a piece of malevolent code that while a Trojan horse does not but can be just as destructive The (murks in Europe and Japan created virus-lik- e havoc but did not propagate like a virus For virus writers who crave notoriety by wreaking maximum havoc there are still too few smartphones and no widespread software platform to attack Hypponen said That is starting to change ' Until recently cell phone operating systems were “closed” unable to download software But new smartphones — - like the Nokia Communicator Handspring’s Treo " Motorola’s Java Phone and Mit— are open o subishi’s y downloads to such At the same time software developers’ tools available for designers of such programs as game ami currency converters can also be used to create malicious applications Hyp- ponen said “It’s possible for anyone to make custom software for this platform” he said “Teens can download development tools and write their own software” It’s these y programs that worry experts If one is disguised as a Trojan horse an infected phone could make some calls on its own ' In a speech at a cell phone confer- ence in France last month Hypponen cited a Slovak Web site virus that posted a bulletin exhorting readers to create phone so-call-ed personal data assistants and sometimes as more Sony Ericsson showed off its P800 Smart Phone equipped with a digital camera that uses the phone’s dis- play screen as viewfinder Snapshots can be swapped capausing the phone’s ' bilities and the phone can play bits of video from the Internet too' Spokesman Peter Bodor said the camera function comes in handy for insurance adjusters — or houschunters like himself “I’m looking at 20 apart- ments a day and I could take pictures and send them to my girlfriend and say This is what I looked at”’ he said The phone is coming out in the fall in Europe no price' has been set yet Another Sony Ericsson gadget the Chatpen lets people send images of handwritten notes or sketches by to Fair - crashing the phone until the SMS message is deleted from the carrier’s server In the United States relatively primitive cell phone technology keeps users immune from such tricks for now Phone hacking is nothing new In the 1970s “phone phreakers" made free phone calls — and even gained control of major trunk lines — by whistling certain tones into the receiver “It was easy” said John Draper 58 of Stockton Calif Draper now a designer of computer security software is still known as 40 Days and 40 hEghbn Return 930 I9 Nawenand n EUJS AREA NEIGHBORHOOD MEETING 2i 2002 THURSDAY MARCH V:' 7:00 RM V ? ELLIS ELJBMENTMY 348 West 300 North Logan ! 0 630 70S Set! Sun 210 ' ! llOaDGFIHEIHNCSaaui A Beautiful Mind ris tiSblSui200 tCACHEtVALLEY3 635 VRiiiBaiHiaxanrfsKiNiaHy 7:10 1300 Nacwi Main Mitaid SiaMpI JotnOfM- OCEANSilau' V1’- - - Mayor- Thompson wiU (Us' " 1’“ ( i A i ?- r V - r - t ''v' t V Logan City Emacncy Preparedness Plan ShdasWardfai - H r 1 ! li- - : MAUNRSTiTSy -- AtoltawerBhsaMMMhra 1 MOWSOCSm ' Ml MM'fawMIt SATURDAY s —i RSOniMiS BS 6Xt MO t PR MMMhllS SEEK J v i -' 'U gi |