Mobile Worms, Viruses and Threats

Total Page:16

File Type:pdf, Size:1020Kb

Mobile Worms, Viruses and Threats R&D Project Report On Mobile Worms, Viruses and Threats By Mitesh M. Khapra (06305016) And Nirav S. Uchat (06305906) under the guidance of Prof. Bernard L. Menezes K.R.School of Information Technology, Indian Institute of Technology, Bombay Mumbai 1 Table of Contents Chapter 1: Introduction to Mobile worms, viruses and threats. ............................................................ 8 1.1. Reality Bites .......................................................................................................................................... 8 1.2. The past, the present and the future!! ................................................................................................. 9 Chapter 2: An Introduction to Symbian .................................................................................................. 11 2.1. Introduction ........................................................................................................................................ 11 2.2. Hardware and Software Issues ........................................................................................................... 11 2.2.1. Some hard facts about the hardware ............................................................................................ 11 2.2.2. Being soft on the hardware ........................................................................................................... 12 2.2.3. Not just a Smartphone .................................................................................................................. 13 2.3. Symbian File System ........................................................................................................................... 13 2.3.1. Some important directories .......................................................................................................... 14 2.4. Symbian Executables .......................................................................................................................... 16 2.5. Symbian APIs ...................................................................................................................................... 16 2.6. Installing applications on Symbian phones ........................................................................................ 17 2.7. Summary ............................................................................................................................................ 18 Chapter 3: Dissecting Symbian SIS Files ................................................................................................. 19 3.1. Introduction ........................................................................................................................................ 19 3.2. SIS Files Format (v7.0, v8.0 and v8.1) ................................................................................................. 19 3.2.1. File Header .................................................................................................................................... 20 3.2.2. File Records ................................................................................................................................... 21 3.3. Hacking in to a Malware Writer’s Mind: ............................................................................................ 23 3.3.1. Case 1: Construct a SIS file programmatically. .............................................................................. 23 3.3.2. Case 2: Embed a malicious SIS file in an existing trusted SIS file. .................................................. 24 3.4. SIS Files Format (v9.1) ........................................................................................................................ 25 3.4.1. Two‐part structure ........................................................................................................................ 26 3.4.2. Symbian Signed ............................................................................................................................. 26 3.5. A Challenge to malware writers ......................................................................................................... 29 3.5.1. Challenge 1: Construct a SIS file programmatically ....................................................................... 29 3.5.2. Challenge 2: Embed a malicious SIS file in an existing trusted SIS file. ......................................... 29 3.6. Summary ............................................................................................................................................ 30 Chapter 4: Cabir – An Analysis ................................................................................................................ 31 4.1. Introduction ........................................................................................................................................ 31 4.2. The message from the dark side! ....................................................................................................... 31 4.3. And the credit goes to… ..................................................................................................................... 31 4.4. Modus Operandi ................................................................................................................................. 32 4.5. The chosen ones ................................................................................................................................. 33 4.6. Behind the scenes ............................................................................................................................... 33 2 4.6.1. Structure and some important files .............................................................................................. 33 4.6.2. Painting the town blue ‐ CARIBEBT.cpp/.h .................................................................................... 35 4.6.3. Install, copy and auto‐start‐ CARIBEINSTALLER.cpp/.h ................................................................. 38 4.7. Summary ............................................................................................................................................ 46 Chapter 5: CommWarrior – An Analysis ................................................................................................. 48 5.1. Introduction ........................................................................................................................................ 48 5.2. The message from the dark side! ....................................................................................................... 48 5.3. And the credit goes to… ..................................................................................................................... 48 5.4. Modus Operandi ................................................................................................................................. 48 5.4.1. Propagation via Bluetooth ............................................................................................................. 49 5.4.2. Propagation via MMS .................................................................................................................... 49 5.5. The chosen ones ................................................................................................................................. 50 5.6. Behind the scenes ............................................................................................................................... 50 5.6.1. Structure and some important files .............................................................................................. 51 5.6.2. Painting the town blue ‐ CommWarriorBT.cpp/.h ........................................................................ 52 5.6.3. Install, copy and auto‐start ‐ CommWarriorInstaller.cpp/.h ......................................................... 52 5.6.4. A message for you ‐ CommWarriorMMS.cpp/.h ........................................................................... 52 5.7. Summary ............................................................................................................................................ 55 Chapter 6: Skuller – An Analysis ............................................................................................................. 56 6.1. Introduction ........................................................................................................................................ 56 6.2. And the credit goes to… ..................................................................................................................... 56 6.3. Modus Operandi ................................................................................................................................. 56 6.4. The chosen ones ................................................................................................................................. 57 6.5. Behind the scenes ............................................................................................................................... 57 6.5.1. Structure and some important files .............................................................................................. 58 6.6. Summary ............................................................................................................................................ 59 Chapter 7: Taxonomy of mobile worms and viruses ............................................................................
Recommended publications
  • Compatibilité Connecteur De Charge De Téléphone Mobile
    Sheet1 Compatibilité Connecteur de Charge de Téléphone Mobile Pour vérifier la compatibilité de votre téléphone : - Veuillez chercher votre modèle de téléphone dans la liste ci-dessous. ( Vous pouvez utiliser la fonction Recherche Ctrl+F) - Notez le type du connecteur de votre téléphone. - Assurez vous que le type de connecteur choisi est indiqué dans le descriptif du chargeur. Si votre appareil ne figure pas dans la liste, merci de le signaler : [email protected] Marque Modèle Connecteur Type Acer beTouch E110 microUSB TC4 Acer beTouch E120 microUSB TC4 Acer beTouch E130 microUSB TC4 Acer beTouch E140 microUSB TC4 Acer beTouch E210 microUSB TC4 Acer beTouch E400 microUSB TC4 Acer Inconia Smart microUSB TC4 Acer Liquid Metal microUSB TC4 Acer neoTouch P300 microUSB TC4 Acer neoTouch P400 microUSB TC4 Acer Stream microUSB TC4 Apple Iphone Apple OEM TC1 Apple Iphone 3G Apple OEM TC1 Apple Iphone 3GS Apple OEM TC1 Apple Iphone 4 Apple OEM TC1 Apple Iphone 4S Apple OEM TC1 Apple Iphone 5 Apple Lightning TC9 Blackberry 5790 Mini USB TC5 Blackberry 5820 Mini USB TC5 Blackberry 6210 Mini USB TC5 Blackberry 6220 Mini USB TC5 Blackberry 6230 Mini USB TC5 Blackberry 6280 Mini USB TC5 Blackberry 6510 Mini USB TC5 Blackberry 7210 Mini USB TC5 Blackberry 7230 Mini USB TC5 Blackberry 7250 Mini USB TC5 Blackberry 7280 Mini USB TC5 Blackberry 7290 Mini USB TC5 Blackberry 7510 Mini USB TC5 Blackberry 7520 Mini USB TC5 Blackberry 8800 Mini USB TC5 Blackberry 8820 Mini USB TC5 Blackberry 8830 Mini USB TC5 Blackberry 7100g Mini USB TC5 Blackberry 7100i Mini
    [Show full text]
  • Mobile Telemedicine and Wireless Remote Monitoring Applications
    İSTANBUL TECHNICAL UNIVERSITY INSTITUTE OF SCIENCE AND TECHNOLOGY MOBILE TELEMEDICINE AND WIRELESS REMOTE MONITORING APPLICATIONS M.Sc. Thesis by Taner SOYUGENÇ, B.Sc. Department : Electronics and Communication Engineering Programme : Biomedical Engineering NOVEMBER 2006 PREFACE In this project, my main goal is to implement a mobile sample application by defining the related global standards for telemedicine. The work is focused on recommendations of technology associated with a feasibility study. First of all, I would like to thank Assoc. Prof. Dr. Selçuk PAKER for his valuable advice, support and encouragement to accomplish the project. Besides, I would like to thank my family who is always with me giving support at every step of my life. November 2006 Taner SOYUGENÇ iii CONTENTS ACRONYMS vi LIST OF TABLES viii LIST OF FIGURES ix SUMMARY xi ÖZET xii 1. INTRODUCTION 1 1.1. Technology Overview 2 1.1.1. Communication Infrastructure 5 1.1.2. Overview of GSM-GPRS 6 1.1.2.1. Brief History of GSM 8 1.1.2.2. GPRS 12 1.1.3. Mobile Solutions 14 1.1.4. Wireless Medical Sensors 15 1.2. Aim of the Project 16 2. WORLDWIDE APPLICATIONS, VENDORS AND STANDARDS 18 2.1. Available Products 19 2.1.1. ECG 19 2.1.2. Pulse Oximeter 20 2.1.3. Blood Pressure Sensor 23 2.1.4. Various Sensor Brands 24 2.1.5. Advanced Research 27 2.1.6. Home Care Monitoring Systems 31 2.2. Medical Information Standards and Organizations 35 2.2.1. ASTM 39 2.2.2. CEN/TC251 Health Informatics 39 2.2.3.
    [Show full text]
  • User Gu Id E
    UserGuide_test 1/26/04 1:04 PM Page 1 Thank you for purchasing your new Nokia phone. We’re here for you! www.nokiahowto.com Learn how to use your new Nokia phone. www.nokia.com/us Get answers to your questions. Register your phone’s limited warranty so we can better serve your needs! Nokia Inc. 7725 Woodland Center Boulevard, Suite 150, Tampa FL 33614 . Phone: 1.888.NOKIA.2U (1.888.665.4228) Fax: 1.813.249.9619 . Text Telephone/Telecommunication Device User Guide for the Deaf (TTY/TDD) Users: 1.800.24.NOKIA (1.800.246.6542) PRINTED IN CANADA 6620.ENv1_9310640.book Page i Wednesday, May 5, 2004 2:44 PM Nokia 6620 User Guide Phone information Numbers Where is the number? My number Wireless service provider Voice mail number Wireless service provider Wireless provider’s number Wireless service provider Provider’s customer care Wireless service provider Label on back of phone Model number (under battery) Label on back of phone Type number (under battery) Label on back of phone IMEI number (under battery) 6620.ENv1_9310640.book Page ii Wednesday, May 5, 2004 2:44 PM NOTES 6620.ENv1_9310640.book Page iii Wednesday, May 5, 2004 2:44 PM LEGAL INFORMATION DECLARATION OF CONFORMITY We, NOKIA CORPORATION declare under our sole responsibility that the product NHL-12 is in conformity with the provisions of the following Council Directive: 1999/5/EC. A copy of the Declaration of Conformity can be found at http://www.nokia.com/phones/declaration_of_conformity 168 PART NO. 9310640, ISSUE NO. 1 Copyright © 2004 Nokia.
    [Show full text]
  • Symbian Worm Yxes: Towards Mobile Botnets?
    J Comput Virol (2012) 8:117–131 DOI 10.1007/s11416-012-0163-2 ORIGINAL PAPER Symbian worm Yxes: towards mobile botnets? Axelle Apvrille Received: 20 December 2010 / Accepted: 3 April 2012 / Published online: 1 May 2012 © Springer-Verlag France 2012 Abstract In 2009, a new Symbian malware named the costs and inconveniences caused by the famous Comm- SymbOS/Yxes was detected and quickly hit the headlines Warrior worm, with 115,000 infected phones [14] and over as one of the first malware for Symbian OS 9 and above 450,000 messages [16] sent prove the matter cannot be under- all as the foretaste of a mobile botnet. Yet, detailed analy- estimated. sis of the malware were still missing. This paper addresses At the beginning of 2009, a new Symbian malware was this issue and details how the malware silently connects to detected [13]. It installed on recent and widely-deployed the Internet, installs new malware or spreads to other victims. Symbian OS 9 phones. The malware looked perfectly legiti- Each of these points are illustrated with commented assembly mate and there was no hint it might be a malware apart from code taken from the malware or re-generated Symbian API the fact it created no application icon. As it was typically con- calls. Besides those implementation aspects, the paper also nected to the word “sexy” (sexy.sisx as package name, “Sexy provides a global overview of Yxes’s behaviour. It explains View”, “Sexy Girls”, “Sexy Space” as application name etc), how malicious remote servers participate in the configuration Fortinet christened it Yxes, i.e.
    [Show full text]
  • Download Opera Mobile for N73
    Download opera mobile for n73 With the award-winning Opera Mobile browser you can surf the same Web sites quickly and easily No hassle just fast browsing for Nokia N73 Free Download. Opera Mini Web Browser - Get the fastest mobile browser with Opera Mini By and gives Opera Mini a sleek modern appearance for Nokia N73 Free Download. Device detected: Nokia - N Download Opera Mobile 12 for Symbian/S60 · Download Opera Mini for Symbian/S60 · Other download options. For more. Found Free Opera Mini Nokia N73 Java Apps. Download Nokia N73 Java Apps for free to your mobile phone or tablet. Why not share and showcase your. Get free browsers & internet downloadable Opera Mini Nokia N73 Java Apps for your mobile device. Free mobile download JAR from our website, mobile site or. Download Opera Mini Nokia N73 Java App to your mobile for free, in jar, uploaded by superchaka in Browsers & Internet. Opera Mini jar. Download Opera Mobile 10 and Opera Mobile , both are full versions! Compatible phones include, N71, N73, N76, N77, N78, N80, N nokia n73 opera mini - Download Free Apps, Games & Videos for mobile and tablet devices from Opera mini for n73 Free Download,Opera mini for n73 Software Collection Opera Mini / Browse the Web quickly with your mobile device. Download Opera mini 7. 1 for Nokia N 73 apps for the Nokia N These apps are free to download and install. The free Opera mini 7. 1 for Nokia N 73 apps. opera mobile n73 Download, opera mobile n73, opera mobile n73 free download, download opera mobile n73 for free software download in the.
    [Show full text]
  • Contemporary Report
    . .......... Mobile Phone and Infrastructure Vulnerabilities Summary and Analysis of Disclosed Issues 2005-2006 Prasanna Kannan Nesret Krasniqi The Thesis comprises 30 ECTS credits and is a compulsory part in the Master of Science with a Major in Master’s Programme in Electrical Engineering with specialisation in Communication and Signalprocessing, 120 ECTS credits Nr 9/2007 Mobile Phone and Infrastructure Vulnerabilities 2005 & 2006 Mobile Phone and Infrastructure Vulnerabilities – summary and analysis of disclosed issues 2005 - 2006 Prasanna Kannan Nesret Krasniqi Master thesis Series and Number Communication and Signal Processing 9/2007 University College of Borås School of Engineering SE-501 90 BORÅS Telephone +46 033 435 4640 Examiner: Jim Arlebrink Supervisor: Lennart Damm Client: OnePutt Solutions, Uppsala, Sweden. Date: 2007-11-08 Keywords: Mobile vulnerabilities , symbian viruses 1 Mobile Phone and Infrastructure Vulnerabilities 2005 & 2006 TABLE OF CONTENTS Abstract………………………………………………………………………………………………………………………10 Introduction……………………………………………………………………………………………………………..........11 About this report…………………………………………………………………………………………………………….12 What is a mobile phone virus and how does it spread? .............. ……………………………………………………………………114 List of vulnerabilities addressed…………………………………………………………………………………………….13 Statistics diagrams for 2005 and 2006………………………………………………………………………………………14 Overview of vulnerability families…………………………………………………………………………………………..16 Analysis………………………………………………………………………………………………………………………26 1. Skulls.D vulnerability
    [Show full text]
  • CMJ251-Manajemen Jaringan Mobile
    CMJ251-Manajemen Jaringan Mobile Dosen Pengampu : 5165-Kundang K Juman, Ir, MMSI Prodi Teknik Informatika Fakultas Ilmu Komputer Applications Middleware Runtime Environment Mobile Operating System It is the software responsible for managing, and exporting the hardware resources provided by devices. It is vital component that hides the underlying hardware complexity and heterogeneity and enables the construction of software. It is similar to the desktop operating system with restricted components. It is including low memory footprint, low dynamic memory usage, efficient power management framework, real-time support for telephony and communication protocols and reliability. 1. Symbian OS 2. Palm OS 3. Windows CE .NET OS PalmOS PocketPC Symbian OS Symbian was established as a private independent company in June 1998 and is owned by Ericsson, Nokia, Panasonic, Motorola, Psion, Samsung Electronics, Siemens and Sony Ericsson. Headquartered in the UK, it has offices in Japan, Sweden, UK and the USA. Sistem operasi smartphone Dari versi 4.x – 9.x Sekarang versi 9.2 – 9.5 Paling banyak dipasaran versi 6.1 dan 7.0 Website: http://www.symbian.com Mendukung 2G, 2.5G, 3G dan 3.5G integrated multimode mobile telephony – Symbian OS integrates the power of computing with mobile telephony, bringing advanced data services to the mass market open application environment – Symbian OS enables mobile phones to be a platform for deployment of applications and services (programs and content) developed in a wide range of languages and content formats open standards and interoperability – with a flexible and modular implementation, Symbian OS provides a core set of application programming interfaces (APIs) and technologies that is shared by all Symbian OS phones.
    [Show full text]
  • 500 Kilobits Per Second (Kbps)
    * IAMDAT 3D Bowling (JAMDAT) ~ $2.49 monthly access or $8.99 for unlimited use purchase V CAST'S array of hot new multimedia programming is located in the Get It Now virtual store. Customers can access video from favorite news, sports and entertainment providers in the getVIDEO shopping aisle from the Get It Now main menu. Video tiips will be refreshed daily throughout the day and will be between 30 seconds and three minutes in length. Customers can check out new cutting-edge 3D games in the getGAMES aisle. V CAST also gives customers monthly access and unlimited airtime to browse applications in the other familiar Get It Now shopping aisles ~ such as getTONES and getGOlNG - but application download fees still apply. "The value of V CAST comes not only from the quality of the experience our network provides, but also from the compelling content line-up we've assembled," said John Stratton, Verizon Wireless vice president and chief marketing officer. "Our list of content providers reads like a who's who of the news, sports, entertainment and game industries. We are offering Verizon Wireless customers a wealth of popular content in the palm of their hands at an affordable price." EV-DO 36 Network V CAST runs on the Verizon Wireless 3G EV-DO network that is now available In more than 30 markets across the country. The Verizon Wireless 3G EV-DO network Initially launched commercially with BroadbandAccess wireless Internet access service for business customers and mobile professionals. BroadbandAccessboasts average user download speeds of 300-500 kilobits per second (kbps).
    [Show full text]
  • Yet Another Symbian Vulnerability Update
    Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 11-30-2010 Yet Another Symbian Vulnerability Update Nizam Uddin Bhuiyan Edith Cowan University Follow this and additional works at: https://ro.ecu.edu.au/ism Part of the Information Security Commons DOI: 10.4225/75/57b523eccd8ae 8th Australian Information Security Mangement Conference, Edith Cowan University, Perth Western Australia, 30th November 2010 This Conference Proceeding is posted at Research Online. https://ro.ecu.edu.au/ism/101 Proceedings of the 8th Australian Information Security Management Conference Yet Another Symbian Vulnerability Update Nizam Uddin Bhuiyan School of Computer and Security Science Edith Cowan University Perth, Western Australia [email protected] Abstract The more the mobile devices are approaching to advance their security, the numbers of vulnerabilities are also becoming more astonishing. The number of mobile phones including smart phones is rising vertically, and so has the amount of malware activity. This report documents the latest threats in Symbian mobile industry and analyses the consequence. In addition, it will suggest the possible solution that may help individuals to protect their device & ultimately maintain the privacy. Keywords Symbian, Nokia vulnerability, Nokia threats, Mobile threat, Symbian malware, Symbian virus, Cell security, Consequences and counter measure for mobile threats. BACKGROUND The popularity of mobile has reached to sky high regardless whether you receive a blank SMS frequently or your mobile keeps sending a SMS to strangers persistently without your knowledge. According to Goode Intelligence 2009 Mobile Security Survey, “In the last couple of years, the percentage of mobile messaging traffic (SMS/MMS/e-mail) that is defined as spam or malware has risen from approximately 2% to between 20% and 30% of total traffic” (Francis, 2010).
    [Show full text]
  • 7. 3G/3.5G Mobile Phone/PDA Support
    7. 3G/3.5G Mobile Phone/PDA Support To streaming from 3/3.5G mobile phone or PDA, you have to open the mobile port of DVR, the default setting is 7050, which may be changed, please refer to 5.5.5 PPPoE/DDNS(Net- Second Page] or IE 6.5 Device Parameters Settings ServerÆNetwork setting, video system For limited upload bandwidth of internet that DVRs connect, or limited streaming capability of some mobile phone/PDA, you have to adjust bandwidth of DVR to internet, please refer to 5.3.8 Dual Streaming for Network(Record- Advanced Setting) or 6.5 Device Parameters Settings - ChannelÆ Camera setting, Sub Bitstream, Subcode (from IE) for more details You may find the Windows Mobile 5.0/6.0/6.1 PDA(amplayersetup.CAB) and Symbian S60 3rd (P2P_S60_3rd_0113.sis) and S60 5th(P2P_S60_5Th_20090112.sis) softwares from the CD inside the DVR package or visit your DVR website to download by IE – http://xxx.xxxx.xxxx/download.html Note: User’s mobile phone must apply internet connection service at first, such as 3G or 3.5G service. Please contact mobile company for detail. 7. 1 Windows Mobile PDA Open accessory CD and find the “amplayersetup.CAB” for the surveillance software. Please refer to PDA user manual, copy *.cab into windows mobile pda Double click on *.cab can start install software into PDA. After install completed, user can find QQEYE in the application list. Execute QQEYE program and click to setup IP address of remote DVR. - 60 - Input user name 〖Admin〗and password. IP address of DVR and port:7050 for streaming data.
    [Show full text]
  • Introduction to Symbian OS
    Fundamentals of Symbian OS Introduction to Symbian OS Introduction Part 1a Copyright © 2001-2007 Symbian Software Ltd. Fundamentals of Symbian OS Introduction Introduction This lecture serves as general introduction to the course • The background of Symbian the company • Symbian OS C++ dialect • The architecture of Symbian OS • What is covered in the course • Resources 2 Copyright © 2001-2007 Symbian Software Ltd. Fundamentals of Symbian OS Introduction Background 3 Copyright © 2001-2007 Symbian Software Ltd. Fundamentals of Symbian OS Introduction Before Symbian - Psion Psion was established in 1980 • To develop games and software for the Z80-based Sinclair ZX81 and ZX Spectrum Products included • Flight simulator, “Horace Goes Skiing”, Psion Chess, Space Raiders and other games. • Psion Chess for the ZX81 took 1K memory • Office suite for the Sinclair QL (1983) 4 Copyright © 2001-2007 Symbian Software Ltd. Fundamentals of Symbian OS Introduction Before Symbian - Psion Mid ‘80s - Hardware • The 6301 based 8-bit Organiser (1984) - 14cm x 9cm, 2K RAM, 4K ROM, 8K datapak, 6 months battery life! • Organiser II (1986) - the world’s first proper PDA • Organiser II variants were created: up to 64K memory, 4 line screen resolution, add-on hardware • Half a million sold over a decade 5 Copyright © 2001-2007 Symbian Software Ltd. Fundamentals of Symbian OS Introduction Before Symbian - Psion 1989 - MC400 laptop • 16-bit “EPOC” Operating System - multi tasking, GUI, built-in apps • Exceptional power management, screen technology 1991 - Series 3, 1993 - Series 3a, 1996 Series 3c/Siena, Series 3mx • Clam shell organisers, built in apps, OPL, up to 2MB memory • Built on EPOC • Over 1.5 million units sold 1997 - Series 5 • 32 bit OS “EPOC32” (EPOC -> EPOC16 -> SIBO) • Slide out QWERTY keyboard, touch screen, 4MB/8MB • Implemented using C++ http://3lib.ukonline.co.uk/historyofpsion.htm 6 Copyright © 2001-2007 Symbian Software Ltd.
    [Show full text]
  • Mobile Platforms Maemo
    Maemo and Symbian S60 EPFL October, 10 th 2009 Mobile Platforms Maemo •Maemo is an open development platform for applications and technology innovation for handheld devices •It was originally developed by Nokia and afterwards offered to the community as opensource Solid software architecture on Linux – first in taking Linux desktop paradigm to mobile devices Optimized for Designed for Mobile Internet Internet Devices – experiences – first in implementing the taking web2.0 apps to Maemo multimedia mobile devices based computer promise on Linux Open for innovation– Developed with some of the best open source communities Open for innovation – developed in collaboration with the open source community 14.000 members 700 hosted projects 200 applications Maemo software Community Nokia is a key contributor to Related open projects such as source projects GNOME/GTK+. Maemo.org maemo.org – 140.000 unique visitors the community 14.000 registered users for innovation 700 hosted projects on Maemo. 200 applications Product evolution Internet Optimized Multimedia Computer Nokia 770 Nokia N800 Nokia N810 Nokia N810 1st generation of Nokia In ternet 2nd generation of Nokia Internet WiMAX Edition Taking the positioning of the Tablet Tablets Tablets. Category from a predominantly ‘one- Bringing WiMAX connection to Easy access to the internet. High way’ surfing tool, to a genuine ‘two strengthen the internet story. With resolution touch sc reen. way’ communication device. wider wireless internet coverage, Internet will truly become personal With integrated
    [Show full text]