Problem solve Get help with specific problems with your technologies, process and projects.

What are the risks associated with RIM's line of PDAs?

PDAs are everywhere. What are the biggest risks and the best ways to keep them secure? Security threats expert Ed Skoudis weighs in.

There's often a lot of hype about the security issues posed by PDAs, but I haven't heard a lot of security concerns about the BlackBerry. What are the most common risks associated with RIM's popular line of PDAs and what precautions can I take to avoid them?
The biggest security threat associated with PDAs and smartphones today, BlackBerry or otherwise, is physical theft. Most users don't secure their PDAs, allowing an attacker to steal them and gain access to the user's email, calendar and contact list, all of which could be valuable information.

Given the popularity of the BlackBerry and its comprehensive feature set, this platform is ripe for the picking by a thief. To help lower the chance of information exposure to a bad guy via this vector, users should configure their devices to require an authentication passcode when it's activated. This feature is a small nuisance for users, but really helps to shore up the security of the device.

Beyond the physical realm, it's possible that an attacker could exploit the BlackBerry from a software perspective by sending an email or SMS message to the device that exploit flaws to install malware on the BlackBerry itself. Historically, there has been little malware for the BlackBerry platform, given the tight controls that RIM maintains over the underlying operating system -- unlike more open platforms like Symbian or Google's new Android. Even though Apple's iPhone was supposedly a closed environment for software developers before the release of Apple's new iPhone Software Development Kit (SDK), it relies on the well-known Macintosh OS X, and has been famously hacked by a growing community of iPhone security vulnerability researchers.

Thanks to scanty documentation and a security model designed to inhibit the running of additional software, BlackBerry devices haven't faced the onslaught of attacks we've seen against other similar devices. But, stay tuned. Since the iPhone hacks have been whetting the appetites of security researchers by showing the value and power of such exploits, we will likely see renewed scrutiny for finding flaws in BlackBerry.

More information:

Dig Deeper on Emerging cyberattacks and threats

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.