background preloader

Simple Steps to Hack a Smartphone

Simple Steps to Hack a Smartphone
What kind of information do you have on your business card? Company name? Check. Your name and title? CSO recently sat down with Trust Digital, a firm that specializes in mobile security, for a demonstration on how to hack a smartphone with no more information than a phone number. "All I need is a business card," said Meir Machlin, director of product architecture with Trust Digital, who performed the demonstration (You can check out the two demonstrations in the video). How to Hack a Smartphone, Part 1 Machlin walked us through two hacks using basic tools available to anyone. The first attack we watched is known as a 'Midnight Raid,' because it is often pulled off during the night when the phone's user is asleep and the device is still turned on as it is charged, or simply left on the nightstand. Machlin sent a simple SMS which invoked Internet Explorer on the attack device. How to Hack a Smartphone, Part 2 In the second demonstration, Machlin ran through a control message attack. Related:  security and hackingSmartphone Hacks

5 Terrifying Smartphone Hacks You Won't Believe Are Possible Sometimes we fail to appreciate the fact that today, right now, we're living in a sci-fi universe. The smartphone is a miracle of mathematics and engineering genius, converting a little over 4 ounces of inert matter into a Star Trek-level wondercomputer. But the downside of storing your entire world inside an ass-pocket-dwelling supercomputer is that there are always those who are itching to turn that technology against you in ways you'd never expect, like ... #5. Your Phone's Tilt Sensor Can Sense What You're Typing on Your Computer Creatas/Creatas/Getty Images If you work a desk job, chances are you keep your smartphone handy on your desk while you're working. That is, there wasn't until a cadre of supervillains (ahem, "researchers") from Georgia Tech decided to create a program that turns your innocent-looking smartphone into a nosy little asshole that sits there spying on your every keystroke. Comstock Images/Comstock/Getty Images"P-O-R-N-H-U-B ..." #4. #3.

He can hack into your smartphone with 1 SMS SINGAPORE - Rik Ferguson looks like someone not to be messed with. The humorous IT security expert, who sports numerous tattoos and has a penchant for heavy metal music, can hack into your mobile phone with a single SMS. He can then remotely listen to your calls, read text messages and even access the password to your online bank account. "It's creepy, isn't it?" Technology experts are warning that mobile devices have become the next lock to pick for cyber criminals. One in three mobile users globally has been exposed to some form of mobile cyber crime, according to a 2012 report by anti-virus firm Norton by Symantec. In Singapore, one in five adults has been a victim of either social or mobile cyber crime, such as scams. As mobile devices become smarter, they have become more susceptible to hacking. "Criminals follow consumer behaviour. Then there are data stealers who snitch on information such as addresses, said Mr Joseph Gan, chief technology officer of local mobile security firm V-Key.

He can hack into your smartphone with 1 SMS SINGAPORE - Rik Ferguson looks like someone not to be messed with. The humorous IT security expert, who sports numerous tattoos and has a penchant for heavy metal music, can hack into your mobile phone with a single SMS. He can then remotely listen to your calls, read text messages and even access the password to your online bank account. "It's creepy, isn't it?" Technology experts are warning that mobile devices have become the next lock to pick for cyber criminals. One in three mobile users globally has been exposed to some form of mobile cyber crime, according to a 2012 report by anti-virus firm Norton by Symantec. In Singapore, one in five adults has been a victim of either social or mobile cyber crime, such as scams. As mobile devices become smarter, they have become more susceptible to hacking. "Criminals follow consumer behaviour. Then there are data stealers who snitch on information such as addresses, said Mr Joseph Gan, chief technology officer of local mobile security firm V-Key.

He can hack into your smartphone with 1 SMS SINGAPORE - Rik Ferguson looks like someone not to be messed with. The humorous IT security expert, who sports numerous tattoos and has a penchant for heavy metal music, can hack into your mobile phone with a single SMS. He can then remotely listen to your calls, read text messages and even access the password to your online bank account. "It's creepy, isn't it?" said Mr Ferguson, who is global vice-president for security research for IT firm Trend Micro, as he demonstrated the hack. Yet, many users still refuse to believe how vulnerable they are when they use mobile devices, he added. Technology experts are warning that mobile devices have become the next lock to pick for cyber criminals. One in three mobile users globally has been exposed to some form of mobile cyber crime, according to a 2012 report by anti-virus firm Norton by Symantec. In Singapore, one in five adults has been a victim of either social or mobile cyber crime, such as scams. "Criminals follow consumer behaviour.

How to use Google for Hacking Google serves almost 80 percent of all the search queries on the Internet, proving itself as the most popular search engine. However, Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post, you will find the information on how to use Google for exploiting security vulnerabilities that exists within many websites. 1. There exists many security cameras that are used for monitoring places like parking lots, college campus, road traffic etc. inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. As you can see in the above screenshot, you now have access to the Live cameras which work in real-time. intitle:”Live View / – AXIS” Now, click on any of the search results to access a different set of live cameras. 2. filetype:xls inurl:”email.xls” 3. “?

The illegality of unlocking your cell phone (and more) » Digital Age Defense In 1998 the Digital Millennium Copyright Act amended U.S. copyright law in a few key ways. Of most relevance here is the additions it made to 17 U.S.C. §§1201 et seq., which includes the provision: “No person shall circumvent a technological measure that effectively controls access to a work protected under this title.” §1201(a)(1)(A) If one does, they can be liable for damages, §1203(c), or, more saliently for this blog, fines of $500,000 and/or 5 years imprisonment for the first offense and $1,000,000 and/or 10 years for subsequent ones. §1204(a). The question here is, why? Historically the “why” is that the US entered into a 1996 treaty obligating it to: But why such a prohibition needed to be enshrined in copyright law at all, much less with criminal penalties, is a separate question, and one without a very good answer. Now, the DMCA does have some exemptions to its prohibition.

70 Things Every Computer Geek Should Know. The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. How to become a real computer Geek? Little known to most, there are many benefits to being a computer geek. You may get the answer here: The Meaning of Technical Acronyms USB – Universal Serial BusGPU – Graphics Processing UnitCPU – Central Processing UnitATA- AT Attachment (AT Attachment Packet Interface (ATAPI)SATA – Serial ATAHTML – Hyper-text Markup LanguageHTTP – Hypertext Transfer ProtocolFTP – File Transfer ProtocolP2P - peer to peer 1. One of the best list of default passwords. 1A. 2. 3. 4.

8 Things You Won't Believe Can Be Hacked If movies are to be believed, hackers are mostly kept busy fighting the man with CGI animations of smiley faces, or else dwelling in the darkest corners of their mothers' basements and doing purely nerdy stuff that never affects the real world. But neither assumption is true: Hacking does not look like a rad skateboarder busting a kickflip over an onyx tower, and hackers do gain access to things that can affect your daily life ... and sometimes, even end it. #8. Explode Your Genitals We think we have a pretty good idea of what hackers are capable of: stealing your personal information, crashing your computer, Rollerblading like a sonofabitch and making out with Angelina Jolie (back when she was hot, before her alien DNA kicked in and she started looking like a hawk-monster). But today's hackers have finally crossed a line, and must be terminated with extreme prejudice. Photos.com"The good news is that your leg is going to be fine ..." "Is it enough to Sharpie 'Avira' onto them?" #7. #6.

Google Dorks & Google Hacking » Freakitude We call them ‘googledorks’ (gOO gôl’Dôrk, noun, slang) : An inept or foolish person as revealed by Google. Google dorks are the center of the Google Hacking. Many hackers use google to find vulnerable webpages and later use these vulnerabilities for hacking. Example Dorks:- 1. CGI directories contain scripts which can often be exploited by attackers.Click here for the Google search ==> “index of cgi-bin” This way you will find many CGI directories some of them may be vulnerable. 2. Click here for the Google search ==> “Welcome to phpMyAdmin” ” Create new database” This way you may find some vulnerable pages to gain access to someone’s PhpMyAdmin. Honeypots Honeypot or Honeypages are webpages designed to attract Google Dorkyz or Google Hackers. The biggest database of Google Dorks is here. Technorati Tags: googledorks, hacking, google Share This

Exploit Exercises

Related: