He can hack into your smartphone with 1 SMS. SINGAPORE - Rik Ferguson looks like someone not to be messed with.
The humorous IT security expert, who sports numerous tattoos and has a penchant for heavy metal music, can hack into your mobile phone with a single SMS. He can then remotely listen to your calls, read text messages and even access the password to your online bank account. "It's creepy, isn't it? " said Mr Ferguson, who is global vice-president for security research for IT firm Trend Micro, as he demonstrated the hack. Yet, many users still refuse to believe how vulnerable they are when they use mobile devices, he added. Technology experts are warning that mobile devices have become the next lock to pick for cyber criminals. One in three mobile users globally has been exposed to some form of mobile cyber crime, according to a 2012 report by anti-virus firm Norton by Symantec. In Singapore, one in five adults has been a victim of either social or mobile cyber crime, such as scams.
"Criminals follow consumer behaviour. This smartphone hack is cool... literally. 5 Terrifying Smartphone Hacks You Won't Believe Are Possible. Sometimes we fail to appreciate the fact that today, right now, we're living in a sci-fi universe.
The smartphone is a miracle of mathematics and engineering genius, converting a little over 4 ounces of inert matter into a Star Trek-level wondercomputer. But the downside of storing your entire world inside an ass-pocket-dwelling supercomputer is that there are always those who are itching to turn that technology against you in ways you'd never expect, like ... #5. Your Phone's Tilt Sensor Can Sense What You're Typing on Your Computer Creatas/Creatas/Getty Images If you work a desk job, chances are you keep your smartphone handy on your desk while you're working.
That is, there wasn't until a cadre of supervillains (ahem, "researchers") from Georgia Tech decided to create a program that turns your innocent-looking smartphone into a nosy little asshole that sits there spying on your every keystroke. Comstock Images/Comstock/Getty Images"P-O-R-N-H-U-B ... " #4. . #3. Simple Steps to Hack a Smartphone.
What kind of information do you have on your business card?
Company name? Check. Your name and title? Check. Business address? CSO recently sat down with Trust Digital, a firm that specializes in mobile security, for a demonstration on how to hack a smartphone with no more information than a phone number. "All I need is a business card," said Meir Machlin, director of product architecture with Trust Digital, who performed the demonstration (You can check out the two demonstrations in the video). How to Hack a Smartphone, Part 1 Machlin walked us through two hacks using basic tools available to anyone.
The first attack we watched is known as a 'Midnight Raid,' because it is often pulled off during the night when the phone's user is asleep and the device is still turned on as it is charged, or simply left on the nightstand. Machlin sent a simple SMS which invoked Internet Explorer on the attack device. How to Hack a Smartphone, Part 2 "The IT guys need to control the phones and secure them.
The illegality of unlocking your cell phone (and more) » Digital Age Defense. In 1998 the Digital Millennium Copyright Act amended U.S. copyright law in a few key ways.
Of most relevance here is the additions it made to 17 U.S.C. §§1201 et seq., which includes the provision: “No person shall circumvent a technological measure that effectively controls access to a work protected under this title.” §1201(a)(1)(A) If one does, they can be liable for damages, §1203(c), or, more saliently for this blog, fines of $500,000 and/or 5 years imprisonment for the first offense and $1,000,000 and/or 10 years for subsequent ones. §1204(a). The question here is, why? Historically the “why” is that the US entered into a 1996 treaty obligating it to: But why such a prohibition needed to be enshrined in copyright law at all, much less with criminal penalties, is a separate question, and one without a very good answer. Now, the DMCA does have some exemptions to its prohibition.