Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Handheld OSes Due for Security Advances

    Written by

    Jason Brooks
    Published July 29, 2002
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Just a few years ago, one could expect little more from a handheld computer than a convenient means of storing and retrieving data such as phone numbers and to-do-list items. Today, these devices have evolved greatly in terms of power, functionality and network connectivity, but as handheld computers and the mobile operating systems that drive them grow more complex, so, too, grows the potential for the sort of security vulnerabilities that plague their desktop- and server-based brethren.

      Earlier this month, such a vulnerability surfaced in the Linux-based Sharp Electronics Corp. Zaurus SL-5500. It was discovered that a flaw in the FTP service the Zaurus uses to conduct desktop synchronization could allow a malicious party to take control of the devices file system via a network attack.

      Handheld computings two big mobile operating system vendors, Palm Inc. and Microsoft Corp., have seized on security as a selling point in their offerings, and we can expect significant security advances in the next-generation handheld operating systems from these companies.

      Microsofts Windows CE .Net, which will serve as the foundation for the next version of the Pocket PC operating system (Pocket PC 2002 is based on Windows CE 3.0), contains a number of security technologies inherited from full-size operating systems.

      Among these technologies is support for wireless LAN security based on the 802.1x standard. Coupled with the Wireless Zero Configuration capability featured in Windows XP, 802.1x should be a boon for companies that wish to provide the convenience of mobile network access to their handheld device users without sacrificing security.

      Many companies already have VPNs (virtual private networks) in place for supporting remote workers. (Click here for some VPNs worth checking out.)

      We also expect to see support for on-device data encryption in future Pocket PC releases, based on the Protected Store functionality of CE.net, as well as support for biometric and smart-card authentication.

      With the focus that Microsoft is placing on Web services on every possible sort of client, the security and authenticity of network links will take on increased importance. Future versions of Pocket PC will also benefit from support for the Kerberos authentication protocol and for Secure Sockets Layer 3.1 protection for Web connections.

      The next-generation handheld operating system from Palm—Palm OS 5— will include significant security improvements compared with the current Palm OS family.

      Looming large among these improvements will be the inclusion of systemwide 128-bit RC4 encryption, provided through Palms partnership with RSA Security Inc. In addition, Palm has announced that future versions of its operating system will feature a plug-in cryptographic architecture that will enable developers to build in other encryption schemes.

      Also on the way for Palm OS 5 is an authentication and authorization framework that will enable administrators and developers to control device access with smart-card and biometric extensions.

      No less important will be Palms move to the ARM chip architecture, which will make for faster devices that are better able to meet the processing-power needs of cryptography.

      Technical Analyst Jason Brooks can be reached at [email protected].

      Related Stories:

      • For Users, Its Back to Basics
      • Security in Hand
      • Mobile Management Tools to the Rescue
      Jason Brooks
      Jason Brooks
      As Editor in Chief of eWEEK Labs, Jason Brooks manages the Labs team and is responsible for eWEEK's print edition. Brooks joined eWEEK in 1999, and has covered wireless networking, office productivity suites, mobile devices, Windows, virtualization, and desktops and notebooks. Jason's coverage is currently focused on Linux and Unix operating systems, open-source software and licensing, cloud computing and Software as a Service.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.