
Companies who have not appropriately applied Research In Motion’s security protections for its BlackBerry communications system are vulnerable to outside attacks based on malware code released mid-August by researchers, and the threat illustrates a wider issue with always-on wireless applications, analysts say. Jesse D’Aguanno, director of professional services and research at consultant Praetorian Global, Placerville, Calif., published his BlackBerry Attack Toolkit on Aug. 16 after first showing off the software at the DefCon reverse engineering convention held in Las Vegas earlier in August.