CellPhone

now browsing by tag

 
 

How Hackers Could Steal Your Cellphone Pictures From Your IoT Crock-Pot

1478090223715787

Source: National Cyber Security – Produced By Gregory Evans

How Hackers Could Steal Your Cellphone Pictures From Your IoT Crock-Pot

If you have an internet-connected home appliance, such as a crock-pot, a lightbulb, or a coffee maker, you can control it from the comfort of your smartphone. But a bug in the Android app that controls some of those devices

The post How Hackers Could Steal Your Cellphone Pictures From Your IoT Crock-Pot appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Hidden cellphone apps could cover up photos, videos

Source: National Cyber Security – Produced By Gregory Evans

Hidden cellphone apps could cover up photos, videos

Pictures can go everywhere, easily, thanks to technology most Americans are walking around with every day: cellphones. More than 100 students in Colorado school district are learning that the hard way as some face felony charges in a sexting ring. According to authorities, hundreds of nude photos of teenagers as young as 13 were exchanged. The investigation uncovered a group of phone applications known as photo vaults. Also known as ghost apps, they appear to be regular applications, like a calculator, but can hide photos and videos behind passwords instead. To check if your teenager has one downloaded to their phone search for “photo vault” or “picture locker” in their app store. If it says “next” to get to the next result, the application hasn’t been downloaded; if it says “open,” it’s already somewhere on their phone. Child development expert Lina Acosta-Sandaal of The Nest Miami recommends being upfront about phone use from the start. “When you hand them the phone for the first time you say, ‘I’m going to look through this phone whenever I want.’” She also tells parents to have conversations with them once they have the phones. Mother Lisa Semoy agrees with this advice: with two […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hidden cellphone apps could cover up photos, videos appeared first on National Cyber Security.

View full post on National Cyber Security

ACLU pushesACLU pushes for state law restricting cellphone tracking by CMPD, other agencies

lK1Hv.Em.138

Source: National Cyber Security – Produced By Gregory Evans

 Powered by Max Banner Ads  RALEIGH The American Civil Liberties Union of North Carolina on Thursday called for new laws that would stop CMPD and other police departments from secretly tracking cellphones without a search warrant. About 20 people, including lawmakers, gathered in the North Carolina Legislative Building to hear speeches urging the General Assembly to put restrictions on high-tech surveillance critics contend violate privacy rights. “We’ve got to stand up for this,” said Thom Goolsby, a Wilmington defense attorney and former Republican state senator. “We’ve got to stop it now. If not, it gets worse and worse.” The push follows an Observer investigation last year that revealed Charlotte-Mecklenburg Police Department investigators use a device called a StingRay that mimics a cellphone tower. It provides serial numbers, location and other information about nearby phones, laptop computers and tablets that connect to cellular networks. Privacy groups and some legal experts say the equipment violates the Constitution’s prohibition against unreasonable search and seizure. The technology gathers cellphone data from criminal suspects and innocent bystanders in a given area. ACLU attorney Nathan Freed Wessler said revelations about CMPD surveillance exposes the need for law enforcement to seek a search warrant before deploying the […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post ACLU pushesACLU pushes for state law restricting cellphone tracking by CMPD, other agencies appeared first on National Cyber Security.

View full post on National Cyber Security

Hackers infiltrating your cellphone? It could happen

2D274907696423-150126-retailers-1516.blocks_desktop_medium

Source: National Cyber Security – Produced By Gregory Evans

These days, it’s the norm to protect your home computer from malware. But what are you doing to protect your cellphone? Yes, your smartphone can be hacked. The average American spends an hour every day playing with their cellphones, according to a study from Experian. In the meantime, they are taking and sharing a lot of photos, sending personal text messages and browsing the Web. “A mobile phone is the perfect spying device,” Kevin Haley, director of product management for Symantec Security Response, told TODAY. “You can listen. You can look. You can track location. And you can view every phone call and every text the person makes.” Bad Apps The most common strategy is through malware. Think about all the permissions we give our apps. Facebook Messenger has access to your location, text messages, camera, stored photos and all kinds of other stuff. Overall, smartphones are safer from malware than PCs. But they can still get infected. One tactic hackers use is spamming people through social media and text messages with links to download malware. More often, hackers will take a popular app, insert malicious code and then put it out there for people who don’t want to pay […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hackers infiltrating your cellphone? It could happen appeared first on National Cyber Security.

View full post on National Cyber Security

Another cellphone surveillance device in Puget Sound?

A 2011 Tacoma Police Department grant application shows that regional law enforcement have used controversial cellphone surveillance technology two years earlier than previously thought. The News Tribune reported in August that the Tacoma police had purchased a device known as […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Cell-Phone Fingerprint Ruling: 5 Things You Should Know

Cell-Phone Fingerprint Ruling: 5 Things You Should Know

With fingerprint-reading technology now being implemented in more and more smartphones, rulings like the one last week really get under people’s skin. Last Tuesday, a Virginia judge ruled that police officers can force a suspect to unlock a smartphone using […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security