blog trackingRealtime Web Statistics Phone Archives | Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘phone’

TIGTA Announces Significant Arrests In Massive IRS Phone Scam

960x0Your ads will be inserted here byEasy Plugin for AdSense.Please go to the plugin admin page toPaste your ad code OR Suppress this ad slot. Scammers are still targeting taxpayers. Nearly 6,400 victims have collectively paid over $36.5 million to scammers posing as Internal Revenue Service (IRS) officials since October of 2013. Over that same […]

View full post on AmIHackerProof.com | Can You Be Hacked?

. . . . .

View full post on Are You Hacker Proof

Turn Your Phone into a Preschool Learning Tool

View full post on Common Sense Blog — Parenting, media, and everything in between — No name







#pso #htcs #b4inc

Read More

The post Turn Your Phone into a Preschool Learning Tool appeared first on Parent Security Online.

View full post on Parent Security Online

Sirin Labs brings $20,000 Android phone and promises military-grade security

Source: National Cyber Security – Produced By Gregory Evans

Sirin Labs is a smartphone maker that, in its own words, is bringing “the phone of tomorrow, today.” The company’s first device, the Solarin, is due to be launched towards the end of May and is expected to carry a price tag of $20,000, Reuters reported. The company, founded by in 2013 by Kazakh entrepreneur Kenges Rakishev, former McKinsey consultant Tal Cohen and venture capitalist Moshe Hogeg, the man behind the messaging app Yo, has raised about $71 million and aims to open its first store alongside the phone’s launch. “(Our) smartphone … brings the most advanced technology available — even if it is not commercially available — and combining it with almost military-grade security,” Hogeg told Reuters. He said he believes people would be willing to spend so much money on a smartphone as executives in Europe and the U.S. would rather not risk the costs associated with being hacked and losing data. That said, SilentCircle’s Blackphone 2 also promises privacy and security, and retails at a price of $799. At $20,000, the Solarin is treading the same space shared by luxury phone-makers like Vertu. While Vertu’s top-end phones are somewhere close to $300,000 by virtue of being made […]

The post Sirin Labs brings $20,000 Android phone and promises military-grade security appeared first on National Cyber Security.

View full post on National Cyber Security

Using just your phone number hackers can spy your calls texts track your movements

1457884066-2504

German security experts say hacking into a smartphone is much easier than one would think giving digital thieves the ability to potentially track a person’s calls, texts and whereabouts. To demonstrate their findings, a team of experts spied on a phone used by US Congressman Ted Lieu from California, a member of the House Oversight and Reform Subcommittee on Information Technology, who agreed to use an off-the-shelf iPhone knowing it would be hacked.

In an interview with “60 Minutes” correspondent Sharyn Alfonsi, Berlin-based Karsten Nohl of Security Research Labs and a team of hackers highlighted how digital pickpockets can exploit mobile phones using a flaw in a global mobile network called Signalling System Seven (SS7) — a little-known, but essential network that connects mobile phone carriers across the globe
Using the congressman’s phone number, Nohl, who has a doctorate in computer engineering from the University of Virginia, was able to exploit that flaw to intercept and record calls, view his contacts, read his texts and even track his movements.

“Any choices that a congressman could’ve made, choosing a phone, choosing a pin number, installing or not installing certain apps, have no influence over what we are showing because this is targeting the mobile network,” said Nohl.

They also automatically logged the number of every phone that called Congressman Lieu as well. Lieu said this list, in a typical congressman’s phone, could include other members of Congress and elected officials.

“First, it’s really creepy. And second, it makes me angry,” said Lieu. “They could hear any call of pretty much anyone who has a smartphone. It could be stock trades you want someone to execute. It could be calls with a bank. Last year, the president of the United States called me on my cellphone. And we discussed some issues. So if the hackers were listening in, they would know that phone conversation. And that’s immensely troubling.”

A significant risk to political leaders, business executives and high-ranking officials whose private phone conversations could fetch a high price in the Dark Web, Nohl says the SS7 flaw is actually an open secret among the world’s intelligence agencies. He also notes that the key flaw lies in the mobile network itself.

“Mobile networks are the only place in which the problem can be solved,” said Nohl. “There is no global policing of SS7. Each mobile network has to move — to protect their customers on their networks. And that is hard.” According to Nohl, all phones are the same and no one phone is more secure than the other.

Hacker and co-founder of the mobile security company Lookout, John Hering, also assembled a group of ace hackers in a hotel room with the 60 Minutes team. The group of hackers who were in Las Vegas for Defcon — one of the largest hacker conferences in the world — try to identify security vulnerabilities in order to protect the public.

They created a “ghost” version of the hotel’s Wi-Fi, which Alfonsi connected to, through a process called “spoofing”. Once she was connected, they were able to access her email, pull her phone number, credit card information, recent purchases and track her movements using ride-sharing app records. They could also take control of her phone’s camera.

Hering does note that while the average person isn’t likely to be exposed to these types of attacks, it is important to be aware of the possibility of such security breaches.

“Our goal was to show what’s possible,” said Hering. “So people can really understand if we don’t address security issues, what the state of the world will be. We live in a world where we cannot trust the technology that we use.”

These findings come amid rising concerns about the growing threat of cybercrime that ranges from identity theft and high-profile security breaches to cyberwar and cyberterrorism. According to the 2015 Identity Fraud Study released by Javelin Strategy & Research, as much as $16bn (£11.2bn) was stolen from 12.7 million US consumers in 2014 which means there was a new identity fraud victim every two seconds that year. Business on the Dark Web is also booming, according to a report by Dell, where “customer-friendly” hackers offer a variety of illicit goods and services on the cheap.
Source:http://www.ibtimes.co.uk/hackers-can-spy-your-calls-texts-track-your-movements-using-just-your-phone-number-experts-say-1555386

Related Post

The post Using just your phone number hackers can spy your calls texts track your movements appeared first on AmIHackerProof.com.

View full post on AmIHackerProof.com | Can You Be Hacked?

. . . . .

View full post on Are You Hacker Proof

How to lock your phone against hackers and others.

more information on sonyhack from leading cyber security experts

ad_202138598

Source: National Cyber Security — Produced By Gregory Evans

This week, Whatsapp struck a blow for liberty by adding encryption to the popular messaging service – this foiling the plans of spies, cops and other snoops. End-to-end encrypted apps mean your messages are safe as they travel – the only person who can read them is the recipient. But what ELSE can you do to keep the data in your phone safe? Here’s a few tips. MORE: Whatsapp: Here’s what that new little yellow message about encryption means 1) Don’t use a four-digit PIN Your password is the ‘gatekeeper’ to stop people getting into your phone – and four-digit PINs are the least secure option. Ideally, choose a fingerprint, backed by an alphanumeric password, or, if you simply must, a six-digit PIN. 2) Set your phone to lock after 30 seconds If someone swipes your phone – or picks it up just after you put it down – they can get in straight away. Set yours to lock as quickly as your phone will let you. 3) Check if there are ‘spy’ apps on your phone If you really ARE being spied on – or if your other half is really suspicious – you might want to look for […]

The post How to lock your phone against hackers and others. appeared first on National Cyber Security.

View full post on National Cyber Security

hacker proof, #hackerproof




Related Post

The post How to lock your phone against hackers and others. appeared first on AmIHackerProof.com.

View full post on AmIHackerProof.com | Can You Be Hacked?

. . . . .

View full post on Are You Hacker Proof

Cell phone security on Apple and Google -operated devices help criminals duck justice

Source: National Cyber Security – Produced By Gregory Evans

Cell phone security on Apple and Google -operated devices help criminals duck justice

The answers to the shooting death of a Louisiana woman could be locked in her iPhone 5, but without a password not even Apple can access the data. It’s an unsolved murder from April that law enforcement officials say is symbolic of a growing number of cases stalled by amped-up security features on Apple and Google-operated devices. Brittney Mills, 29, was 8 months pregnant when she opened the door to someone who wanted to borrow her car in Baton Rouge on April 24. She refused and was shot several times. Her baby, Brenton Mills, died a week later. Mills had the iOS-8 operating software on her phone, but the encryption system — intended to protect users’ privacy — has made owners’ text messages, phone calls and contact lists inaccessible since September 2014. In the Louisiana case, cell phone data, including a personal diary, was not backed up on iCloud. A subpoena seeking the data resulted in a missive from Apple saying that because the phone is “running iOS version 8 or a later version” the “extraction cannot be completed.” About 1,300 miles northeast of Baton Rouge, frustrated prosecutors in New Orleans have an ally in Manhattan District Attorney Cyrus Vance […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Cell phone security on Apple and Google -operated devices help criminals duck justice appeared first on National Cyber Security.

View full post on National Cyber Security

Prison phone company recorded private lawyer-inmate calls, hack reveals Bills

Source: National Cyber Security – Produced By Gregory Evans

Prison phone company recorded private lawyer-inmate calls, hack reveals Bills

Concerns about civil liberty violations are spreading after an unidentified hacker recently breached Securus Technologies and released the audio of an estimated 70 million phone conversations of USA prisoners -including communications between attorneys and their clients. “It is very important to note that we have found absolutely no evidence of attorney-client calls that were recorded without the knowledge and consent of those parties”, the firm said. Each call record included a link to a downloadable recording of the call. However, it is common practice to monitor prisoner phone calls for the objective of protecting individuals working in the prisons as well as those on the outside. Securus had been previously breached in 2014, the publication additionally revealed, “when someone hacked three calls made by an inmate named Aaron Hernandez, presumably the former player for the New England Patriots, who was awaiting trial for [allegedly] killing a friend”. It’s not the first indication that Securus may have been recording calls with attorneys. In a statement to the press, Securus Technologies officials say the company found no evidence of a hack, claiming its more likely someone with authorized access leaked the records. The cache of phone records was leaked via SecureDrop by […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Prison phone company recorded private lawyer-inmate calls, hack reveals Bills appeared first on National Cyber Security.

View full post on National Cyber Security

70M Private Phone Calls Leaked in Prison Hack

Source: National Cyber Security – Produced By Gregory Evans

70M Private Phone Calls Leaked in Prison Hack

An anonymous hacker has accessed 70 million phone calls placed by inmates in at least 37 states by breaching Securus Technologies, a prominent telecommunications provider for correctional institutions. Of these, at least 14,000 were confidential conversations between inmates and their attorneys. The Intercept, an investigative news site, first reported the attack after receiving insider information from the hacker. The site states the telecommunications hack spans a nearly two-and-a-half year period, beginning in December 2011 and ending in the spring of 2014. Securus records all inmate phone calls to uphold security standards within these facilities; however, they are not allowed to record and store conversations between inmates and their attorneys in many states. The hacker claims they released these records to expose the recordings of attorney-client communications, an act that potentially impedes an inmate’s right to effective assistance of counsel. This hack comes approximately a year after a group of Texas lawyers sued Securus for illegally recording privileged conversations. Securus’ protocol is for attorneys to register their phone numbers for exemption; however, unregistered numbers, despite the nature of the conversation, will still be recorded. Securus is currently cooperating with law enforcement to investigate the incident. In a company statement, Securus suggests […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post 70M Private Phone Calls Leaked in Prison Hack appeared first on National Cyber Security.

View full post on National Cyber Security

Prison phone company recorded private lawyer-inmate calls, hack reveals NYSE Post

Source: National Cyber Security – Produced By Gregory Evans

Prison phone company recorded private lawyer-inmate calls, hack reveals NYSE Post

Calling it “the most massive breach of the attorney-client privilege in modern US history”, the American Civil Liberties Union told The Intercept that while prisoners lose many of their constitutional rights, the right to speak privately with an attorney — related to the Sixth Amendment — must be protected. Today, the Intercept published a report on Securus Technologies-a jail telephone service provider that is heretofore best known for gouging the shit out of detainees and their families-based on a cache of metadata and recordings of tens of millions of calls provided to the outlet by an anonymous hacker. According to The Intercept, the hacker was concerned that inmates’ constitutional rights had been violated and submitted the phone records to the online news organization. The breach highlights two major issues, the first being that Securus’ systems aren’t as well protected as they claim; the second is that the current system for preventing attorneys’ calls from being recorded isn’t watertight. (The Texas Department of Criminal Justice’s offender phone system is subcontracted to Securus, according to a TDCJ spokesman). “Although this investigation is ongoing, we have seen no evidence that records were shared as a result of a technology breach or hack into […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Prison phone company recorded private lawyer-inmate calls, hack reveals NYSE Post appeared first on National Cyber Security.

View full post on National Cyber Security

Page 1 of 3412345»102030...Last »

My Twitter

  • Cyber Security News Today is out! https://t.co/WxWDanKcTK @gregorydevans #hacker
    about 4 hours ago
  • RT @GregoryDEvans: This Is What Can Happen When Dads Meditate https://t.co/p4QeirA2q2 #security #hacker #HTCS
    about 9 hours ago
  • RT @GregoryDEvans: The Bottom Line: ‘Goodnight, You Beautiful Women’ By Anna Noyes https://t.co/fhlaJLdlUh #security #hacker #HTCS
    about 15 hours ago
  • RT @GregoryDEvans: The Bottom Line: ‘Goodnight, You Beautiful Women’ By Anna Noyes https://t.co/fhlaJLdlUh #security #hacker #HTCS
    about 15 hours ago
  • RT @GregoryDEvans: The Bottom Line: ‘Goodnight, You Beautiful Women’ By Anna Noyes https://t.co/fhlaJLdlUh
    about 15 hours ago

AmIHackerProof.com By Gregory D. Evans

Hacker For Hire By Gregory Evans

Gregory D. Evans On Facebook

Parent Securty By Gregory D. Evans

National Cyber Security By Gregory D. Evans

Dating Scams By Gregory Evans