cell

now browsing by tag

 
 

Cell phones charging are at greatest risk from hackers

Source: National Cyber Security – Produced By Gregory Evans

Cell phones charging are at greatest risk from hackers

Cell phones, as with websites and other forms of communications equipment, are at risk from hacking. A major vulnerability arises with smartphones when they are charging, according to a new study from the New York Institute of Technology. The risks of charging a smartphone via a USB cord have been established for a while. What the new study shows is …

The post Cell phones charging are at greatest risk from hackers appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Cell Phone And Tablet Forensics

890

Source: National Cyber Security – Produced By Gregory Evans

Cell Phone And Tablet Forensics

Mobile technology has become a powerful crime-fighting tool. Cell phones contain call history, contacts, text messages, web browser history, email, a Global Positioning System (GPS), and other location information that police and law enforcement agencies find valuable. Evidence from cell

The post Cell Phone And Tablet Forensics appeared first on National Cyber Security.

View full post on National Cyber Security

This is how hackers can hijack cell phone towers!

cell-phone-tower-hacking

Source: National Cyber Security – Produced By Gregory Evans

This is how hackers can hijack cell phone towers!

Attackers Hijack Cellular Phone Towers Thanks To Critical Flaws
You and I are afraid of somebody hacking our smartphones and stealing critical information, but what happens when hackers hijack a whole cellular network by hacking into cellphone towers? No, this

The post This is how hackers can hijack cell phone towers! appeared first on National Cyber Security.

View full post on National Cyber Security

The Only Back-to-School Cell Phone Rules Your Kids Really Need

View full post on Common Sense Blog – Parenting, media, and everything in between – No name







#pso #htcs #b4inc

Read More

The post The Only Back-to-School Cell Phone Rules Your Kids Really Need appeared first on Parent Security Online.

View full post on Parent Security Online

Hackers paid by FBI to get cell data

Source: National Cyber Security – Produced By Gregory Evans

WASHINGTON — The FBI cracked a San Bernardino terrorist’s phone with the help of professional hackers who discovered and brought to the bureau at least one previously unknown software flaw, according to people familiar with the matter. The new information was then used to create a piece of hardware that helped the FBI to crack the iPhone’s four-digit personal identification number without triggering a security feature that would have erased all the data, the individuals said. The researchers, who typically keep a low profile, specialize in hunting for vulnerabilities in software and then in some cases selling them to the US government. They were paid a one-time flat fee for the solution. Cracking the four-digit PIN, which the FBI had estimated would take 26 minutes, was not the hard part for the bureau. The challenge from the beginning was disabling a feature on the phone that wipes data stored on the device after 10 incorrect tries at guessing the PIN code. A second feature also steadily increases the time allowed between attempts. The bureau in this case did not need the services of the Israeli firm Cellebrite, as some earlier reports had suggested, people familiar with the matter said. The […]

The post Hackers paid by FBI to get cell data appeared first on National Cyber Security.

View full post on National Cyber Security

Cell phone security on Apple and Google -operated devices help criminals duck justice

Source: National Cyber Security – Produced By Gregory Evans

Cell phone security on Apple and Google -operated devices help criminals duck justice

The answers to the shooting death of a Louisiana woman could be locked in her iPhone 5, but without a password not even Apple can access the data. It’s an unsolved murder from April that law enforcement officials say is symbolic of a growing number of cases stalled by amped-up security features on Apple and Google-operated devices. Brittney Mills, 29, was 8 months pregnant when she opened the door to someone who wanted to borrow her car in Baton Rouge on April 24. She refused and was shot several times. Her baby, Brenton Mills, died a week later. Mills had the iOS-8 operating software on her phone, but the encryption system – intended to protect users’ privacy – has made owners’ text messages, phone calls and contact lists inaccessible since September 2014. In the Louisiana case, cell phone data, including a personal diary, was not backed up on iCloud. A subpoena seeking the data resulted in a missive from Apple saying that because the phone is “running iOS version 8 or a later version” the “extraction cannot be completed.” About 1,300 miles northeast of Baton Rouge, frustrated prosecutors in New Orleans have an ally in Manhattan District Attorney Cyrus Vance […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Cell phone security on Apple and Google -operated devices help criminals duck justice appeared first on National Cyber Security.

View full post on National Cyber Security

Cell Phone Unlocking & Computer Maintenance (Newton)

Source: National Cyber Security – Produced By Gregory Evans

Cell Phone Unlocking & Computer Maintenance (Newton)

We are now processing factory unlocks and jealbreak for any cell phone for most providers.. We can provide a permanent unlock in 1-12hrs.. After Unlocking your phone can be used with any carrier network. All Android Phones Factory Unlock. Rogers / Fido iPhone (All Models Supported) Factory unlock. Telus / Koodo iPhone (All Models Supported) Factory unlock. Bell / Virgin iPhone (All Models Supported) Factory unlock. We Fix Computer Hardware & Software. We Buy & Sell Phones & Computers. Source: http://vancouver.craigslist.ca/rds/cps/5299528705.html

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Cell Phone Unlocking & Computer Maintenance (Newton) appeared first on National Cyber Security.

View full post on National Cyber Security

Mumbai Police plan to lodge Chhota Rajan in Crime Branch Unit-1 cell

Source: National Cyber Security – Produced By Gregory Evans

Mumbai Police plan to lodge Chhota Rajan in Crime Branch Unit-1 cell

THE MUMBAI Police have finalised the Crime Branch Unit I cell located inside the Mumbai Police Commissionerate to lodge Rajendra Nikhalje alias Chhota Rajan on his return to India, during his custody in Mumbai. Rajan was arrested by the Bali police on October 26 from Bali in Indonesia after the Australian Police said that he was travelling on a fake passport on the name of Mohan Kumar. However, it is still not clear if upon Chhota Rajan’s arrival in India, the Mumbai police will be the first to stake claim to his custody. “Since he was using a fake passport in Sydney, a case can be registered with the Delhi Police. If the Centre takes the decision of handing over Rajan to the Delhi Police in the fake passport case, we can stake claim to his custody only after them, despite having 75 cases against Rajan,” said a source. The Mumbai Crime branch is now busy translating all the relevant case papers pertaining to Chhota Rajan in the local Indonesian language as part of the extradition process. It is likely to submit a fresh dossier to the home department on the 75 cases against Rajan by the weekend. The Mumbai […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Mumbai Police plan to lodge Chhota Rajan in Crime Branch Unit-1 cell appeared first on National Cyber Security.

View full post on National Cyber Security

THE PRACTICAL POTATO CELL

Source: National Cyber Security – Produced By Gregory Evans

Potato batteries, lemon batteries, they’re all good fun for the classroom — but is there a way of making them better? [Marcel Varallo] decided to give it a shot — and we gotta admit, it’s a pretty cool idea! Normally for these fruit and vegetable batteries you poke some leads into the battery, connect it to a clock, and bob’s your uncle. But what if we made them resemble batteries? [Marcel] took some copper pipe, cut it down to size, and poked it through a potato. Now he had a potato-cored, copper tube. Stick a zinc nail in the middle, and you’ve got yourself a battery cell! Or as [Marcel] likes to put it.. a Mar-Cell. Or the more scientific term.. the Solanum tuberosum based electron differencer V1.0. Each potato cell produces approximately 0.8V, so if you throw eight in series, you’ll have the equivalent of a 6V battery, just maybe not the same mAh rating. For another cool way to demonstrate electricity to youngsters, we love this lemon battery hack — it’s actually quite elegant. Source: https://hackaday.com/tag/potato-cell/

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post THE PRACTICAL POTATO CELL appeared first on National Cyber Security.

View full post on National Cyber Security

Woman beaten, set alight for her cell

Source: National Cyber Security – Produced By Gregory Evans

Durban – An Estcourt woman has recounted how she found her neighbour beaten and burnt outside her home, allegedly by a man who had robbed her of her cellphone. Purity Sithole, of Loskop in Estcourt, testified on Monday in the trial of Sicelo Xaba, 34, who is charged with the vicious murder of a local woman, Goodness Khanyile, who was beaten with a knobkierie and then set alight. Sithole told the Pietermaritzburg High Court that on February 22 last year, she was at home when her nephew told her there was a woman outside who needed an ambulance. When she went to investigate, she was shocked to discover it was her neighbour, Khanyile. “I found her sitting on the road, crying with her hands raised in the air. She was naked, and she was screaming that she was burning and blood was running down her face,” Sithole said. The woman said she asked Khanyile what had happened to her, and she replied that one Sicelo Xaba had attacked her with a knobkierie and then poured petrol on her and set her alight. “She told me she managed to run away from him. I did not know who this Sicelo Xaba […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Woman beaten, set alight for her cell appeared first on National Cyber Security.

View full post on National Cyber Security