Ask the Expert

What are the risks associated with RIM's line of PDAs?

There's often a lot of hype about the security issues posed by PDAs, but I haven't heard a lot of security concerns about the BlackBerry. What are the most common risks associated with RIM's popular line of PDAs and what precautions can I take to avoid them?

    Requires Free Membership to View

The biggest security threat associated with PDAs and smartphones today, BlackBerry or otherwise, is physical theft. Most users don't secure their PDAs, allowing an attacker to steal them and gain access to the user's email, calendar and contact list, all of which could be valuable information.

Given the popularity of the BlackBerry and its comprehensive feature set, this platform is ripe for the picking by a thief. To help lower the chance of information exposure to a bad guy via this vector, users should configure their devices to require an authentication passcode when it's activated. This feature is a small nuisance for users, but really helps to shore up the security of the device.

Beyond the physical realm, it's possible that an attacker could exploit the BlackBerry from a software perspective by sending an email or SMS message to the device that exploit flaws to install malware on the BlackBerry itself. Historically, there has been little malware for the BlackBerry platform, given the tight controls that RIM maintains over the underlying operating system -- unlike more open platforms like Symbian or Google's new Android. Even though Apple's iPhone was supposedly a closed environment for software developers before the release of Apple's new iPhone Software Development Kit (SDK), it relies on the well-known Macintosh OS X, and has been famously hacked by a growing community of iPhone security vulnerability researchers.

Thanks to scanty documentation and a security model designed to inhibit the running of additional software, BlackBerry devices haven't faced the onslaught of attacks we've seen against other similar devices. But, stay tuned. Since the iPhone hacks have been whetting the appetites of security researchers by showing the value and power of such exploits, we will likely see renewed scrutiny for finding flaws in BlackBerry.

More information:

This was first published in March 2008

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: