number

now browsing by tag

 
 

We’ve matched on a dating app, but please don’t ask for my phone number

It’s 11am, I”m up to my eyeballs in work, and a man I have yet to meet is asking, via text, how I like to be worshipped. With your silence, is what I’m thinking. Why I chose to relax my no-digits-before-dates rule this time is a mystery. Was it because he asked, politely? Because he seemed charming and harmless? Or was it just boredom? Initially, I greeted his textual come-ons with jokes, then politely demurred when he tried to ratchet it up a notch. Read More….

The post We’ve matched on a dating app, but please don’t ask for my phone number appeared first on Dating Scams 101.

View full post on Dating Scams 101

Why your phone number is valuable to hackers

phone-number-blog-800x400

Source: National Cyber Security – Produced By Gregory Evans

Why your phone number is valuable to hackers

Cell phone numbers are particularly valuable, as they have become the modern-day equivalent of your wallet. Your mobile device contains valuable information like your contacts list (a great way to get a list of your friends—future identity theft targets), affinity

The post Why your phone number is valuable to hackers appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Using just your phone number hackers can spy your calls texts track your movements

1457884066-2504

German security experts say hacking into a smartphone is much easier than one would think giving digital thieves the ability to potentially track a person’s calls, texts and whereabouts. To demonstrate their findings, a team of experts spied on a phone used by US Congressman Ted Lieu from California, a member of the House Oversight and Reform Subcommittee on Information Technology, who agreed to use an off-the-shelf iPhone knowing it would be hacked.

In an interview with “60 Minutes” correspondent Sharyn Alfonsi, Berlin-based Karsten Nohl of Security Research Labs and a team of hackers highlighted how digital pickpockets can exploit mobile phones using a flaw in a global mobile network called Signalling System Seven (SS7) – a little-known, but essential network that connects mobile phone carriers across the globe
Using the congressman’s phone number, Nohl, who has a doctorate in computer engineering from the University of Virginia, was able to exploit that flaw to intercept and record calls, view his contacts, read his texts and even track his movements.

“Any choices that a congressman could’ve made, choosing a phone, choosing a pin number, installing or not installing certain apps, have no influence over what we are showing because this is targeting the mobile network,” said Nohl.

They also automatically logged the number of every phone that called Congressman Lieu as well. Lieu said this list, in a typical congressman’s phone, could include other members of Congress and elected officials.

“First, it’s really creepy. And second, it makes me angry,” said Lieu. “They could hear any call of pretty much anyone who has a smartphone. It could be stock trades you want someone to execute. It could be calls with a bank. Last year, the president of the United States called me on my cellphone. And we discussed some issues. So if the hackers were listening in, they would know that phone conversation. And that’s immensely troubling.”

A significant risk to political leaders, business executives and high-ranking officials whose private phone conversations could fetch a high price in the Dark Web, Nohl says the SS7 flaw is actually an open secret among the world’s intelligence agencies. He also notes that the key flaw lies in the mobile network itself.

“Mobile networks are the only place in which the problem can be solved,” said Nohl. “There is no global policing of SS7. Each mobile network has to move — to protect their customers on their networks. And that is hard.” According to Nohl, all phones are the same and no one phone is more secure than the other.

Hacker and co-founder of the mobile security company Lookout, John Hering, also assembled a group of ace hackers in a hotel room with the 60 Minutes team. The group of hackers who were in Las Vegas for Defcon – one of the largest hacker conferences in the world – try to identify security vulnerabilities in order to protect the public.

They created a “ghost” version of the hotel’s Wi-Fi, which Alfonsi connected to, through a process called “spoofing”. Once she was connected, they were able to access her email, pull her phone number, credit card information, recent purchases and track her movements using ride-sharing app records. They could also take control of her phone’s camera.

Hering does note that while the average person isn’t likely to be exposed to these types of attacks, it is important to be aware of the possibility of such security breaches.

“Our goal was to show what’s possible,” said Hering. “So people can really understand if we don’t address security issues, what the state of the world will be. We live in a world where we cannot trust the technology that we use.”

These findings come amid rising concerns about the growing threat of cybercrime that ranges from identity theft and high-profile security breaches to cyberwar and cyberterrorism. According to the 2015 Identity Fraud Study released by Javelin Strategy & Research, as much as $16bn (£11.2bn) was stolen from 12.7 million US consumers in 2014 which means there was a new identity fraud victim every two seconds that year. Business on the Dark Web is also booming, according to a report by Dell, where “customer-friendly” hackers offer a variety of illicit goods and services on the cheap.
Source:http://www.ibtimes.co.uk/hackers-can-spy-your-calls-texts-track-your-movements-using-just-your-phone-number-experts-say-1555386

Related Post

The post Using just your phone number hackers can spy your calls texts track your movements appeared first on AmIHackerProof.com.

View full post on AmIHackerProof.com

Hong Kong Sees Rising Number of Cyberattacks

Source: National Cyber Security – Produced By Gregory Evans

Hong Kong Sees Rising Number of Cyberattacks

A year after pro-democracy protests filled the streets of Hong Kong, the city has become a target of multiple, and sophisticated, cyber attacks. Hong Kong cyber security watchdog Hong Kong Computer Emergency Response Team said there has been a 38 percent rise in hacking attacks since last year. Nicholas Thomas, a Professor at the City University of Hong Kong, said it is unclear who is behind these cyber attacks. “With what’s been going on the Hong Kong side, there’s been no direct tie to the Chinese government, or any government agencies. That is possible of course. But this could equally be Chinese hacker groups who are displaying some nationalist tendencies in cyberspace and doing this under their own steam,” said Thomas. Since August of last year there have been more than 1,175 phishing attacks, where users’ data and computers are compromised after clicking on an attachment to an email. But cyber attacks in the city have not been limited to phishing methods. Western security experts say hackers are using more sophisticated techniques, such as Google Drive and Dropbox to hack into democracy activists’ devices. Hackers are also using “white lists,” which compromise the data of certain visitors to some websites. […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hong Kong Sees Rising Number of Cyberattacks appeared first on National Cyber Security.

View full post on National Cyber Security

Child abuse cases number in 100s

In 2014, the Clinton County District Attorney’s Child Advocacy Center handled 257 cases of child abuse.

The total in Clinton County was 230, with the remainder in Essex County, said Executive Director Richelle Gregory.

According to the Advocacy Center’s website, 166 cases were sexual abuse allegations, 32 were physical abuse allegations, and 27 were a combination of the two.

Gregory said numbers are going to be pretty high this year because programs have continued to educate the local population.

“When I first started, it was 90 cases of child abuse in Clinton County,” she said.

“We’ve more than tripled that number just through education and having people better report, identify, and (having) a better net for pulling (offenders) in and making sure they go through and get processed.

Read More

The post Child abuse cases number in 100s appeared first on Parent Security Online.

View full post on Parent Security Online

The Number Of Spark Networks’s Paid Subscribers Is Slowly Growing

MARKETWIRE – Oct 2 – Jewish networks subscribers grew 1.8% (64,144) compared to Q2 2015. Christian networks subscribers grew 0. Read More….

The post The Number Of Spark Networks’s Paid Subscribers Is Slowly Growing appeared first on Dating Scams 101.

View full post on Dating Scams 101

Facebook Loophole Makes Your Phone Number A Data Hacking Tool

Source: National Cyber Security – Produced By Gregory Evans

Facebook has been asked to fix its security settings after a product specialist had the capacity harvest information about a great many clients – just by speculating their versatile numbers. The designer acquired the names, profile pictures and areas of clients who had connected their portable number to their Facebook account yet had picked not to make it open. Security specialists said the proviso would permitprogrammers to fabricate huge databases of Facebook clients available to be purchased on web underground markets. “They ought to be endeavoring to keep the widescale hoovering up of information, and I’m disillusioned to hear that they seem to have fizzled on this event,” saidGraham Cluley, a PC security examiner. Reza Moaiandin, the product engineer who found the imperfection, misused a bit known security setting typing so as to permit anybody to discover a Facebook client their telephone number into the interpersonal organization. Of course, this Who can discover me? setting is situated to Everybody/open – importance anybody can discover another client by their portable number. This is the default setting regardless of the possibility that that client had decided to withold their versatile number from their open profile. Utilizing a straightforward calculation, Moaiandin created countless […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Facebook Loophole Makes Your Phone Number A Data Hacking Tool appeared first on National Cyber Security.

View full post on National Cyber Security

PUTTING YOUR MOBILE PHONE NUMBER ON FACEBOOK IS A DEFINITE NO-NO

Source: National Cyber Security – Produced By Gregory Evans

Security experts recently urged Facebook to change some of its privacy settings because a hidden vulnerability may put millions of public profiles and linked phone numbers in the hands of hackers and abusers. Experts learned that it is a simple as typing into the site’s search bar a random mobile phone number to get the full public profile of a user including their personal photos, home address, and location. Unfortunately, users that chose to hide their private number may also fall victims to exploiters. IT analyst Reza Moaiandin of U.K.-based Salt Agency found that there’s a subtle vulnerability that can be used by any basic-skill hacker to harvest tons of personal data just by typing on Facebook random phone numbers. The site has a privacy setting that allows anybody on the platform to find a user just by typing into a search box their phone number. The setting is called “Who can find me?” and it is set by default to “Public.” So, anyone on the social networking site can find anyone with help from only a string of numbers. And choosing to hide your phone number from the public doesn’t mean you are safe. The site still matches your […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post PUTTING YOUR MOBILE PHONE NUMBER ON FACEBOOK IS A DEFINITE NO-NO appeared first on National Cyber Security.

View full post on National Cyber Security

Number of rapes reported to police in Walsall rises by a fifth

THE number of rapes reported in Walsall has risen by almost a fifth in the space of a year, according to new figures shared with the Advertiser. Latest statistics show that West Midlands Police have received 103 reports in the borough since April last year. It is a more than 18 per cent rise on last year’s figures, when 87 reports were made to police. Read More….

The post Number of rapes reported to police in Walsall rises by a fifth appeared first on Dating Scams 101.

View full post on Dating Scams 101