blog trackingRealtime Web Statistics Phone Archives | Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘phone’

Police Warn of New Phone Scam

scamphone

Source: National Cyber Security – Produced By Gregory Evans

Scammers already have your credit card number but need something from you to access the account Beverly Hills police have issued a warning about a credit card scam that was reported by a resident. The scammer calls would-be victims on the telephone claiming to be from the security and fraud department of either VISA or […]

The post Police Warn of New Phone Scam appeared first on National Cyber Security.

View full post on National Cyber Security

For $20M, These Israeli Hackers Will Spy On Any Phone On The Planet

anthony

Source: National Cyber Security – Produced By Gregory Evans

With just a few million dollars and a phone number, you can snoop on any call or text that phone makes – no matter where you are or where the device is located. That’s the bold claim of Israel’s Ability Inc, which offers its set of bleeding-edge spy tools to governments the world over. And […]

The post For $20M, These Israeli Hackers Will Spy On Any Phone On The Planet appeared first on National Cyber Security.

View full post on National Cyber Security

TIGTA Announces Significant Arrests In Massive IRS Phone Scam

960x0Your ads will be inserted here byEasy Plugin for AdSense.Please go to the plugin admin page toPaste your ad code OR Suppress this ad slot. Scammers are still targeting taxpayers. Nearly 6,400 victims have collectively paid over $36.5 million to scammers posing as Internal Revenue Service (IRS) officials since October of 2013. Over that same […]

View full post on AmIHackerProof.com | Can You Be Hacked?

. . . . .

View full post on Are You Hacker Proof

Turn Your Phone into a Preschool Learning Tool

View full post on Common Sense Blog — Parenting, media, and everything in between — No name







#pso #htcs #b4inc

Read More

The post Turn Your Phone into a Preschool Learning Tool appeared first on Parent Security Online.

View full post on Parent Security Online

Sirin Labs brings $20,000 Android phone and promises military-grade security

Source: National Cyber Security – Produced By Gregory Evans

Sirin Labs is a smartphone maker that, in its own words, is bringing “the phone of tomorrow, today.” The company’s first device, the Solarin, is due to be launched towards the end of May and is expected to carry a price tag of $20,000, Reuters reported. The company, founded by in 2013 by Kazakh entrepreneur Kenges Rakishev, former McKinsey consultant Tal Cohen and venture capitalist Moshe Hogeg, the man behind the messaging app Yo, has raised about $71 million and aims to open its first store alongside the phone’s launch. “(Our) smartphone … brings the most advanced technology available — even if it is not commercially available — and combining it with almost military-grade security,” Hogeg told Reuters. He said he believes people would be willing to spend so much money on a smartphone as executives in Europe and the U.S. would rather not risk the costs associated with being hacked and losing data. That said, SilentCircle’s Blackphone 2 also promises privacy and security, and retails at a price of $799. At $20,000, the Solarin is treading the same space shared by luxury phone-makers like Vertu. While Vertu’s top-end phones are somewhere close to $300,000 by virtue of being made […]

The post Sirin Labs brings $20,000 Android phone and promises military-grade security appeared first on National Cyber Security.

View full post on National Cyber Security

Using just your phone number hackers can spy your calls texts track your movements

1457884066-2504

German security experts say hacking into a smartphone is much easier than one would think giving digital thieves the ability to potentially track a person’s calls, texts and whereabouts. To demonstrate their findings, a team of experts spied on a phone used by US Congressman Ted Lieu from California, a member of the House Oversight and Reform Subcommittee on Information Technology, who agreed to use an off-the-shelf iPhone knowing it would be hacked.

In an interview with “60 Minutes” correspondent Sharyn Alfonsi, Berlin-based Karsten Nohl of Security Research Labs and a team of hackers highlighted how digital pickpockets can exploit mobile phones using a flaw in a global mobile network called Signalling System Seven (SS7) — a little-known, but essential network that connects mobile phone carriers across the globe
Using the congressman’s phone number, Nohl, who has a doctorate in computer engineering from the University of Virginia, was able to exploit that flaw to intercept and record calls, view his contacts, read his texts and even track his movements.

“Any choices that a congressman could’ve made, choosing a phone, choosing a pin number, installing or not installing certain apps, have no influence over what we are showing because this is targeting the mobile network,” said Nohl.

They also automatically logged the number of every phone that called Congressman Lieu as well. Lieu said this list, in a typical congressman’s phone, could include other members of Congress and elected officials.

“First, it’s really creepy. And second, it makes me angry,” said Lieu. “They could hear any call of pretty much anyone who has a smartphone. It could be stock trades you want someone to execute. It could be calls with a bank. Last year, the president of the United States called me on my cellphone. And we discussed some issues. So if the hackers were listening in, they would know that phone conversation. And that’s immensely troubling.”

A significant risk to political leaders, business executives and high-ranking officials whose private phone conversations could fetch a high price in the Dark Web, Nohl says the SS7 flaw is actually an open secret among the world’s intelligence agencies. He also notes that the key flaw lies in the mobile network itself.

“Mobile networks are the only place in which the problem can be solved,” said Nohl. “There is no global policing of SS7. Each mobile network has to move — to protect their customers on their networks. And that is hard.” According to Nohl, all phones are the same and no one phone is more secure than the other.

Hacker and co-founder of the mobile security company Lookout, John Hering, also assembled a group of ace hackers in a hotel room with the 60 Minutes team. The group of hackers who were in Las Vegas for Defcon — one of the largest hacker conferences in the world — try to identify security vulnerabilities in order to protect the public.

They created a “ghost” version of the hotel’s Wi-Fi, which Alfonsi connected to, through a process called “spoofing”. Once she was connected, they were able to access her email, pull her phone number, credit card information, recent purchases and track her movements using ride-sharing app records. They could also take control of her phone’s camera.

Hering does note that while the average person isn’t likely to be exposed to these types of attacks, it is important to be aware of the possibility of such security breaches.

“Our goal was to show what’s possible,” said Hering. “So people can really understand if we don’t address security issues, what the state of the world will be. We live in a world where we cannot trust the technology that we use.”

These findings come amid rising concerns about the growing threat of cybercrime that ranges from identity theft and high-profile security breaches to cyberwar and cyberterrorism. According to the 2015 Identity Fraud Study released by Javelin Strategy & Research, as much as $16bn (£11.2bn) was stolen from 12.7 million US consumers in 2014 which means there was a new identity fraud victim every two seconds that year. Business on the Dark Web is also booming, according to a report by Dell, where “customer-friendly” hackers offer a variety of illicit goods and services on the cheap.
Source:http://www.ibtimes.co.uk/hackers-can-spy-your-calls-texts-track-your-movements-using-just-your-phone-number-experts-say-1555386

Related Post

The post Using just your phone number hackers can spy your calls texts track your movements appeared first on AmIHackerProof.com.

View full post on AmIHackerProof.com | Can You Be Hacked?

. . . . .

View full post on Are You Hacker Proof

How to lock your phone against hackers and others.

more information on sonyhack from leading cyber security experts

ad_202138598

Source: National Cyber Security — Produced By Gregory Evans

This week, Whatsapp struck a blow for liberty by adding encryption to the popular messaging service – this foiling the plans of spies, cops and other snoops. End-to-end encrypted apps mean your messages are safe as they travel – the only person who can read them is the recipient. But what ELSE can you do to keep the data in your phone safe? Here’s a few tips. MORE: Whatsapp: Here’s what that new little yellow message about encryption means 1) Don’t use a four-digit PIN Your password is the ‘gatekeeper’ to stop people getting into your phone – and four-digit PINs are the least secure option. Ideally, choose a fingerprint, backed by an alphanumeric password, or, if you simply must, a six-digit PIN. 2) Set your phone to lock after 30 seconds If someone swipes your phone – or picks it up just after you put it down – they can get in straight away. Set yours to lock as quickly as your phone will let you. 3) Check if there are ‘spy’ apps on your phone If you really ARE being spied on – or if your other half is really suspicious – you might want to look for […]

The post How to lock your phone against hackers and others. appeared first on National Cyber Security.

View full post on National Cyber Security

hacker proof, #hackerproof




Related Post

The post How to lock your phone against hackers and others. appeared first on AmIHackerProof.com.

View full post on AmIHackerProof.com | Can You Be Hacked?

. . . . .

View full post on Are You Hacker Proof

Cell phone security on Apple and Google -operated devices help criminals duck justice

Source: National Cyber Security – Produced By Gregory Evans

Cell phone security on Apple and Google -operated devices help criminals duck justice

The answers to the shooting death of a Louisiana woman could be locked in her iPhone 5, but without a password not even Apple can access the data. It’s an unsolved murder from April that law enforcement officials say is symbolic of a growing number of cases stalled by amped-up security features on Apple and Google-operated devices. Brittney Mills, 29, was 8 months pregnant when she opened the door to someone who wanted to borrow her car in Baton Rouge on April 24. She refused and was shot several times. Her baby, Brenton Mills, died a week later. Mills had the iOS-8 operating software on her phone, but the encryption system — intended to protect users’ privacy — has made owners’ text messages, phone calls and contact lists inaccessible since September 2014. In the Louisiana case, cell phone data, including a personal diary, was not backed up on iCloud. A subpoena seeking the data resulted in a missive from Apple saying that because the phone is “running iOS version 8 or a later version” the “extraction cannot be completed.” About 1,300 miles northeast of Baton Rouge, frustrated prosecutors in New Orleans have an ally in Manhattan District Attorney Cyrus Vance […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Cell phone security on Apple and Google -operated devices help criminals duck justice appeared first on National Cyber Security.

View full post on National Cyber Security

Page 1 of 3412345»102030...Last »

My Twitter

  • RT @GregoryDEvans: 5 Conversations to Have with Your Kids After The BFG https://t.co/HSQmvTTlbN
    about 1 hour ago
  • RT @GregoryDEvans: #galaxylife #samsung4life Website/IP https://t.co/sZQkmNQMh5 may be hackable #hacked, #WGH, #UK, #hackerproof https://t.…
    about 3 hours ago
  • RT @GregoryDEvans: Website/IP https://t.co/sZQkmO8n8D may be hackable #hacked, #WGH, #UK, #hackerproof https://t.co/KnLOJ6s5fd
    about 4 hours ago
  • RT @GregoryDEvans: Website/IP https://t.co/sZQkmO8n8D may be hackable #hacked, #WGH, #UK, #hackerproof https://t.co/KnLOJ6s5fd #security #h…
    about 4 hours ago
  • RT @GregoryDEvans: #galaxylife #samsung4life Website/IP https://t.co/77VSMeWohF may be hackable #hacked, #WGH, #UK, #hackerproof https://t.…
    about 4 hours ago

AmIHackerProof.com By Gregory D. Evans

Hacker For Hire By Gregory Evans

Gregory D. Evans On Facebook

Parent Securty By Gregory D. Evans

National Cyber Security By Gregory D. Evans

Dating Scams By Gregory Evans