I would be more concerned with other types of attacks that have been proven possible through proof of concept. Such as:
1) In 2003 it was reported that an attacker could flood a phone with thousands of text messages. This would disable the phone and possible leave the owner with a bill for the thousands of messages. http://www.nwfusion.com/news/2003/1124comdex.html
2) Some phones and PDA phones allow you to download and save e-mail. If the device is stolen this mail can be easily retrieved by the attacker.
Over the next several years cell phones and other mobile devices will become bigger and bigger targets for attackers. The Gartner Group predicts that by 2005, 10 percent of attacks on corporate enterprises will be caused by infected mobile users (laptops, PDA, cell phones, etc.)
No matter what platform you use practice safe computing.
Dig Deeper on Enterprise mobile security
Related Q&A from Michael Gregg
Enterprise security expert, Michael Gregg answers a question regarding port 3389 issues when a user tries to open port 3389 RDP on their router to ...continue reading
Security expert Michael Gregg discusses the disadvantages to a layered approach to enterprise security.continue reading
Security expert Michael Gregg fields a question about unknown network cards gaining access to a user's network.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.