ABSTRACT

Executive Summary In 2004, a mobile malicious code called Cabir began attacking the Symbian operating system used on certain cellular phones; soon after, other mobile malicious code followed. Despite the media coverage and industry hype that it received, the actual threat posed by Cabir was minimal, as it used Bluetooth capabilities of these phones to propagate. However, Bluetooth, with a range of about 30 feet, proved an inefficient infection vector. erefore, and despite the hype surrounding it, Cabir should have been considered a proof-of-concept malicious code instead of the harbinger of disaster it was painted to be.