Apparently, it is not difficult to mess with people's phones. I copied this from the WIRED website... "In the 17 minutes we wandered around, Laurie's computer picked up signals from 39 phones. "It takes only 15 seconds to suck down somebody's address book, so we could have had a lot of those," he says at last. "And at least five of these phones were vulnerable to an attack."
The "attack" Laurie mentions so casually could mean almost anything - a person using another person's cell to make long distance calls or changing every phone number in his address book or even bugging his conversations. There are, he says, "a whole range of new powers" available to the intrepid phone marauder, including nasty viral attacks." Click here to read the article in full.
So we are waiting with bated breath to see whether the cellphone company insist we pay the bill. We kindly reported the breach in their system to them. They cancelled the number. We requested a credit. They are thinking about it. We better get the whole thing credited or heads will roll.
Be aware. Turn your cellphone off when you don't need it. (Kind of defeats the purpose though eh?)