Hacking the Linux kernel is nothing new, and bugs or out right
This is something that every device has, and something that mobile security and policy will provide guidance overall for the company. Given what is currently known about the systems, the focus has been more on unlocking the systems rather than injecting evil code into the phones. From a risk viewpoint, there is little to no difference between what you are doing now against what is required for any other modern cell phone that connects to the internet, has MP3s, and all the rest of the things that cell phones seem to do now.
Without an increase in material risk that is already faced by every single mobile device out there, it is important then to make sure that folks do not start trying to sell a company snake oil that promises to somehow cure all your mobile worries. If you already have policy, NAC, AV, and all the other things that mobile devices need, then you don't need to do anything other than what you are doing now. While it is best to upgrade those systems, if you have a solution in place, there is no need to come up with something new to work with some unspecified threat that is meant to create FUD and sell more stuff.
Suggest a Correction
Found an error or have a suggestion? Let us know and we'll review it.





No comments yet. Be the first to comment!