blog trackingRealtime Web Statistics Phone Archives | Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘phone’

Snowden designs a phone case that hides owner’s location

348820-1

Source: National Cyber Security – Produced By Gregory Evans

Snowden designs a phone case that hides owner’s location

Edward Snowden has secretly been working on a project to stop smartphones from revealing the location of people in dangerous places. Snowden said he envisions it as a protection for journalists and human rights workers, but it could be used by anyone who doesn’t want to be spied on. On Thursday, the ex-NSA whistleblower unveiled […]

The post Snowden designs a phone case that hides owner’s location appeared first on National Cyber Security.

View full post on National Cyber Security

In first, U.S. judge throws out cell phone ‘stingray’ evidence

A businessman sits on a bench looking over his mobile phone in downtown San Francisco, California February 4, 2016.  REUTERS/Mike Blake

Source: National Cyber Security – Produced By Gregory Evans

In first, U.S. judge throws out cell phone ‘stingray’ evidence

For the first time, a federal judge has suppressed evidence obtained without a warrant by U.S. law enforcement using a stingray, a surveillance device that can trick suspects’ cell phones into revealing their locations. U.S. District Judge William Pauley in Manhattan on Tuesday ruled that defendant Raymond Lambis’ rights were violated when the U.S. Drug […]

The post In first, U.S. judge throws out cell phone ‘stingray’ evidence appeared first on National Cyber Security.

View full post on National Cyber Security

The Alarming Phone Call I Got From My Daughter In Dallas

2016-07-09-1468070672-3427197-image.png

They say the things we worry about aren’t usually the things that actually happen to us. They say what “gets us” are things we never see coming — the things we never even think to worry about. That’s obviously true when it comes to parenting…

My daughter called me last night as I was finishing up a phone call with a girlfriend. I want to tell you that I clicked right over to my daughter, but I confess that I was wrapping up a riveting conversation and decided I could call my child right back.

Read More

The post The Alarming Phone Call I Got From My Daughter In Dallas appeared first on Parent Security Online.

View full post on Parent Security Online

Police Warn of New Phone Scam

scamphone

Source: National Cyber Security – Produced By Gregory Evans

Scammers already have your credit card number but need something from you to access the account Beverly Hills police have issued a warning about a credit card scam that was reported by a resident. The scammer calls would-be victims on the telephone claiming to be from the security and fraud department of either VISA or […]

The post Police Warn of New Phone Scam appeared first on National Cyber Security.

View full post on National Cyber Security

For $20M, These Israeli Hackers Will Spy On Any Phone On The Planet

anthony

Source: National Cyber Security – Produced By Gregory Evans

With just a few million dollars and a phone number, you can snoop on any call or text that phone makes – no matter where you are or where the device is located. That’s the bold claim of Israel’s Ability Inc, which offers its set of bleeding-edge spy tools to governments the world over. And […]

The post For $20M, These Israeli Hackers Will Spy On Any Phone On The Planet appeared first on National Cyber Security.

View full post on National Cyber Security

TIGTA Announces Significant Arrests In Massive IRS Phone Scam

960x0Your ads will be inserted here byEasy Plugin for AdSense.Please go to the plugin admin page toPaste your ad code OR Suppress this ad slot. Scammers are still targeting taxpayers. Nearly 6,400 victims have collectively paid over $36.5 million to scammers posing as Internal Revenue Service (IRS) officials since October of 2013. Over that same […]

View full post on AmIHackerProof.com | Can You Be Hacked?

. . . . .

View full post on Are You Hacker Proof

Turn Your Phone into a Preschool Learning Tool

View full post on Common Sense Blog — Parenting, media, and everything in between — No name







#pso #htcs #b4inc

Read More

The post Turn Your Phone into a Preschool Learning Tool appeared first on Parent Security Online.

View full post on Parent Security Online

Sirin Labs brings $20,000 Android phone and promises military-grade security

Source: National Cyber Security – Produced By Gregory Evans

Sirin Labs is a smartphone maker that, in its own words, is bringing “the phone of tomorrow, today.” The company’s first device, the Solarin, is due to be launched towards the end of May and is expected to carry a price tag of $20,000, Reuters reported. The company, founded by in 2013 by Kazakh entrepreneur Kenges Rakishev, former McKinsey consultant Tal Cohen and venture capitalist Moshe Hogeg, the man behind the messaging app Yo, has raised about $71 million and aims to open its first store alongside the phone’s launch. “(Our) smartphone … brings the most advanced technology available — even if it is not commercially available — and combining it with almost military-grade security,” Hogeg told Reuters. He said he believes people would be willing to spend so much money on a smartphone as executives in Europe and the U.S. would rather not risk the costs associated with being hacked and losing data. That said, SilentCircle’s Blackphone 2 also promises privacy and security, and retails at a price of $799. At $20,000, the Solarin is treading the same space shared by luxury phone-makers like Vertu. While Vertu’s top-end phones are somewhere close to $300,000 by virtue of being made […]

The post Sirin Labs brings $20,000 Android phone and promises military-grade security appeared first on National Cyber Security.

View full post on National Cyber Security

Using just your phone number hackers can spy your calls texts track your movements

1457884066-2504

German security experts say hacking into a smartphone is much easier than one would think giving digital thieves the ability to potentially track a person’s calls, texts and whereabouts. To demonstrate their findings, a team of experts spied on a phone used by US Congressman Ted Lieu from California, a member of the House Oversight and Reform Subcommittee on Information Technology, who agreed to use an off-the-shelf iPhone knowing it would be hacked.

In an interview with “60 Minutes” correspondent Sharyn Alfonsi, Berlin-based Karsten Nohl of Security Research Labs and a team of hackers highlighted how digital pickpockets can exploit mobile phones using a flaw in a global mobile network called Signalling System Seven (SS7) — a little-known, but essential network that connects mobile phone carriers across the globe
Using the congressman’s phone number, Nohl, who has a doctorate in computer engineering from the University of Virginia, was able to exploit that flaw to intercept and record calls, view his contacts, read his texts and even track his movements.

“Any choices that a congressman could’ve made, choosing a phone, choosing a pin number, installing or not installing certain apps, have no influence over what we are showing because this is targeting the mobile network,” said Nohl.

They also automatically logged the number of every phone that called Congressman Lieu as well. Lieu said this list, in a typical congressman’s phone, could include other members of Congress and elected officials.

“First, it’s really creepy. And second, it makes me angry,” said Lieu. “They could hear any call of pretty much anyone who has a smartphone. It could be stock trades you want someone to execute. It could be calls with a bank. Last year, the president of the United States called me on my cellphone. And we discussed some issues. So if the hackers were listening in, they would know that phone conversation. And that’s immensely troubling.”

A significant risk to political leaders, business executives and high-ranking officials whose private phone conversations could fetch a high price in the Dark Web, Nohl says the SS7 flaw is actually an open secret among the world’s intelligence agencies. He also notes that the key flaw lies in the mobile network itself.

“Mobile networks are the only place in which the problem can be solved,” said Nohl. “There is no global policing of SS7. Each mobile network has to move — to protect their customers on their networks. And that is hard.” According to Nohl, all phones are the same and no one phone is more secure than the other.

Hacker and co-founder of the mobile security company Lookout, John Hering, also assembled a group of ace hackers in a hotel room with the 60 Minutes team. The group of hackers who were in Las Vegas for Defcon — one of the largest hacker conferences in the world — try to identify security vulnerabilities in order to protect the public.

They created a “ghost” version of the hotel’s Wi-Fi, which Alfonsi connected to, through a process called “spoofing”. Once she was connected, they were able to access her email, pull her phone number, credit card information, recent purchases and track her movements using ride-sharing app records. They could also take control of her phone’s camera.

Hering does note that while the average person isn’t likely to be exposed to these types of attacks, it is important to be aware of the possibility of such security breaches.

“Our goal was to show what’s possible,” said Hering. “So people can really understand if we don’t address security issues, what the state of the world will be. We live in a world where we cannot trust the technology that we use.”

These findings come amid rising concerns about the growing threat of cybercrime that ranges from identity theft and high-profile security breaches to cyberwar and cyberterrorism. According to the 2015 Identity Fraud Study released by Javelin Strategy & Research, as much as $16bn (£11.2bn) was stolen from 12.7 million US consumers in 2014 which means there was a new identity fraud victim every two seconds that year. Business on the Dark Web is also booming, according to a report by Dell, where “customer-friendly” hackers offer a variety of illicit goods and services on the cheap.
Source:http://www.ibtimes.co.uk/hackers-can-spy-your-calls-texts-track-your-movements-using-just-your-phone-number-experts-say-1555386

Related Post

The post Using just your phone number hackers can spy your calls texts track your movements appeared first on AmIHackerProof.com.

View full post on AmIHackerProof.com | Can You Be Hacked?

. . . . .

View full post on Are You Hacker Proof

Page 1 of 3412345»102030...Last »

My Twitter

  • @GregoryDEvans #thanks for sharing about #security, have a great Sunday :)
    about 53 mins ago
  • RT @GregoryDEvans: Website/IP https://t.co/nz8jgozUhp may be hackable #hacked, #WGH, #USA, #hackerproof https://t.co/Y4MaJGeup3
    about 2 hours ago
  • RT @GregoryDEvans: #galaxylife #samsung4life The Skin I am In: The Day I Realized I Was Body Shaming Myself https://t.co/dAD2b8fNB3
    about 7 hours ago
  • RT @GregoryDEvans: Website/IP https://t.co/aUduiexzUH may be hackable #hacked, #WGH, #USA, #hackerproof https://t.co/P1vgDrnUmO
    about 8 hours ago
  • RT @GregoryDEvans: Website/IP https://t.co/cOUVXZMnen may be hackable #hacked, #WGH, #USA, #hackerproof https://t.co/CvnEwZ3JaL
    about 14 hours ago

AmIHackerProof.com By Gregory D. Evans

Hacker For Hire By Gregory Evans

Gregory D. Evans On Facebook

Parent Securty By Gregory D. Evans

National Cyber Security By Gregory D. Evans

Dating Scams By Gregory Evans