I would be more concerned with other types of attacks that have been proven possible through proof of concept. Such as:
1) In 2003 it was reported that an attacker could flood a phone with thousands of text messages. This would disable the phone and possible leave the owner with a bill for the thousands of messages. http://www.nwfusion.com/news/2003/1124comdex.html
2) Some phones and PDA phones allow you to download and save e-mail. If the device is stolen this mail can be easily retrieved by the attacker.
Over the next several years cell phones and other mobile devices will become bigger and bigger targets for attackers. The Gartner Group predicts that by 2005, 10 percent of attacks on corporate enterprises will be caused by infected mobile users (laptops, PDA, cell phones, etc.)
No matter what platform you use practice safe computing.
Related Q&A from Michael Gregg
Enterprise security expert, Michael Gregg answers a question regarding port 3389 issues when a user tries to open port 3389 RDP on their router to ...continue reading
Expert Michael Gregg answers a reader question about Snort and the interfaces it uses.continue reading
Security expert Michael Gregg notes the risks to enteprise security that mobile devices may cause.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.