phones

now browsing by tag

 
 

Vetting of social media, phones possible as part of travel ban review

Source: National Cyber Security – Produced By Gregory Evans

The Trump administration is developing new ways to vet people coming into the United States as a deadline in the President’s controversial travel ban nears, officials said Tuesday. “Each of the opportunities that the US government has to interview and/or vet potential inbound travelers is being reviewed,” acting Customs and…

The post Vetting of social media, phones possible as part of travel ban review appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

The 11 year old ‘cyber ninja’ who stunned experts at a security conference by hacking their phones and showing how to ‘weaponise’ a smart teddy bear

To Purchase This Product/Services, Go To The Store Link Above Or Go To http://www.become007.com/store/ An 11-year-old ‘cyber ninja’ stunned an audience of security experts Tuesday by hacking into their Bluetooth devices to manipulate a teddy bear and show how interconnected smart toys ‘can be weaponised’. …

The post The 11 year old ‘cyber ninja’ who stunned experts at a security conference by hacking their phones and showing how to ‘weaponise’ a smart teddy bear appeared first on Become007.com.

View full post on Become007.com

Cell phones charging are at greatest risk from hackers

Source: National Cyber Security – Produced By Gregory Evans

Cell phones charging are at greatest risk from hackers

Cell phones, as with websites and other forms of communications equipment, are at risk from hacking. A major vulnerability arises with smartphones when they are charging, according to a new study from the New York Institute of Technology. The risks of charging a smartphone via a USB cord have been established for a while. What the new study shows is …

The post Cell phones charging are at greatest risk from hackers appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Malicious Android malware lets hackers access your phone’s connected network

Source: National Cyber Security – Produced By Gregory Evans

Malicious Android malware lets hackers access your phone’s connected network

Security researchers have discovered a new strain of malware that turns Android devices into backdoors, giving malicious attackers the ability to access any internal network that the infected device is …

The post Malicious Android malware lets hackers access your phone’s connected network appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

New York man charged with trying to buy phones with stolen ID

roberto-garcia-charged-with-forgery-and-id-theft

Source: National Cyber Security – Produced By Gregory Evans

New York man charged with trying to buy phones with stolen ID

BOARDMAN, Ohio (WKBN) – A Bronx, New York man was arrested after police said he tried to purchase cell phones at the Southern Park Mall with a stolen identification card.
Roberto Garcia, 20, was picked up at the Spring store

The post New York man charged with trying to buy phones with stolen ID appeared first on National Cyber Security.

View full post on National Cyber Security

Android bug ‘could allow hackers complete access to 900 million phones’

android (1)

Source: National Cyber Security – Produced By Gregory Evans

Android bug ‘could allow hackers complete access to 900 million phones’

Almost one billion Android devices are affected by a serious security flaw which can give attackers access to all data and hardware, including the camera. The vulnerability, dubbed ‘Quadrooter’ was flagged by researchers from Check Point, an international cyber security company. It affects all devices which use a Qualcomm chip – thought to be in […]

The post Android bug ‘could allow hackers complete access to 900 million phones’ appeared first on National Cyber Security.

View full post on National Cyber Security

Cops are struggling to crack encrypted phones used for organised crime due to advances in technology

Source: National Cyber Security – Produced By Gregory Evans

Cops are struggling to crack encrypted phones used for organised crime due to advances in technology

LAW enforcement agencies are being thwarted in the war on terror and organised crime by a surge in highly-encrypted mobile phones. Codebreakers say they are involved in a constant battle with manufacturers updating their technology to stay one step ahead of hackers. Experts say police and counter-terrorism units are unable to extract vital information from the handsets, which have now become almost impossible to crack. Analysts working for police, the National Crime Agency (NCA), the Borders Agency and HM Revenue and Customs have also warned specialist mobile devices offering voice encryption are impossible to breach. Telecoms firms have introduced expensive handsets offering military-grade encryptions to the market. The Sunday Mail can reveal that one private investigator operating in the west of Scotland sold a consignment of these devices to an organised crime group earlier this year. We also found a seller in Birmingham flogging similar devices on classified ads website Gumtree. The unnamed man offered our reporter anti-tapping phones with six months’ encryption for £2200 and handsets with PGP (Pretty Good Privacy) encryption for £1100. He said: “I’ve got a load of phones. I’ve got a couple of prices. If you’re looking to make calls out, there’s a special unit […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Cops are struggling to crack encrypted phones used for organised crime due to advances in technology appeared first on National Cyber Security.

View full post on National Cyber Security

Police destroying phones due to ‘sexting’ situation in country communities

‘Sexting’ is so prolific in the Cootamundra Local Area Command in south-western New South Wales, one family has left the district after an image of their daughter went viral.

Youth Liaison Officer, Senior Constable Joe Camilleri, said police have destroyed seven mobiles belonging to young people recently as they contained inappropriate pictures, while the destruction of a further three phones is being considered.

“We’ve sought some professional advice from our people in Sydney and they can only give a 95 per cent guarantee that those images are removed,” he said.

These kids aren’t intentionally wanting to create child porn, but because of their age, that’s exactly what they’ve done and there are predators out there who would love to get these images and when they do go online, as we all know, you cannot retrieve them.

Read More

The post Police destroying phones due to ‘sexting’ situation in country communities appeared first on Parent Security Online.

View full post on Parent Security Online

‘CoinKrypt’ Malware Uses Google Android Phones to Mine Virtual Currency

Hackers are no longer behind your data. Now they are interested in your phone. Yes this is increasing becoming global phenomena where hackers are developing malware to damage your phone and earn virtual currency known as bitcoin. Phone Mining is a terms use to describe the way in which hackers can use your phone to generate virtual currency.
 These malware are embedded in different android apps and are usually uploaded on Google store. A user download an app thinking of it to be game, or whatever he wants. Yet in truth it is a malware that will install it self on ur device and then use it to mine digital money. Just recently, researchers at Trend Micro noted the appearance of Google Android malware as repacked copies of popular apps such as Football Manager Handheld and TuneInvRadio that is involved in mining digital money. 
The apps were injected with the CPU mining code from a legitimate Android cryptocurrency mining app that is based on the well- known cpuminer software.

Lookout principal security researcher Marc Rogers told Security Week that software can not only use your packet data but it can also damage or burn your hardware. As it sets the infected phone to mine for currency by downloading and generating Gigabytes of hashes. 
Which will heat up your phone incredibly and will damage your phone’s battery and power supply. “Users with phones and tablets that are suddenly charging slowly, running hot, or quickly running out of batteries may want to consider if they have been exposed to this or similar threats,” blogged Trend Micro Mobile Threats Analyst Veo Zhang. “Also, just because an app has been downloaded from an app store – even Google Play – does not mean it is safe”.

Source: http://whogothack.blogspot.co.uk/2014/04/malware-uses-google-android-phones-to_11.html#.Vl4DA1UrLIU

The post ‘CoinKrypt’ Malware Uses Google Android Phones to Mine Virtual Currency appeared first on Am I Hacker Proof.

View full post on Am I Hacker Proof

Latest Android phones hijacked with tidy one-stop-Chrome-pop

Source: National Cyber Security – Produced By Gregory Evans

Latest Android phones hijacked with tidy one-stop-Chrome-pop

PacSec Google’s Chrome for Android has been popped in a single exploit that could lead to the compromise of any handset. The exploit, showcased at MobilePwn2Own at the PacSec conference in Tokyo yesterday but not disclosed in full detail, targets the JavaScript v8 engine. It can probably hose all modern and updated Android phones if users visit a malicious website. It is also notable in that it is a single clean exploit that does not require multiple chained vulnerabilities to work, the researchers say. Quihoo 360 researcher Guang Gong showcased the exploit which he developed over three months. PacSec organiser Dragos Ruiu told Vulture South the exploit was demonstrated on a new Google Project Fi Nexus 6. “The impressive thing about Guang’s exploit is that it was one shot; most people these days have to exploit several vulnerabilities to get privileged access and load software without interaction, ” Ruiu says. “As soon as the phone accessed the website the JavaScript v8 vulnerability in Chrome was used to install an arbitrary application (in this case a BMX Bike game) without any user interaction to demonstrate complete control of the phone.” “The vuln being in recent version of Chrome should work on […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Latest Android phones hijacked with tidy one-stop-Chrome-pop appeared first on National Cyber Security.

View full post on National Cyber Security