phone hacking can extend beyond voice mail
Last Updated : GMT 09:03:51
Almaghrib Today, almaghrib today
Almaghrib Today, almaghrib today
Last Updated : GMT 09:03:51
Almaghrib Today, almaghrib today

Phone hacking can extend beyond voice mail

Almaghrib Today, almaghrib today

Almaghrib Today, almaghrib today Phone hacking can extend beyond voice mail

London - Arabstoday
While the phone hacking by British tabloid News of the World was unexceptional by technical standards, security experts say the scandal portends how the growth of smartphones will lead to more sophisticated breaches.The tactics that tabloid reporters used to eavesdrop on high-profile British targets -- and eventually led News Corp. to announce Thursday it is killing the 167-year-old publication -- were remarkably low tech.Former News of the World staffers say that reporters employed tricks to access voice-mail inboxes and procure a great deal of information from British celebrities and the royal family. Experts say that to obtain the PIN codes needed to access those accounts, the reporters used an illegal method known as pretexting.This tactic involves calling, say, a customer-service representative for a cell-phone operator and impersonating someone to get details about that person's account. In many places, such as the United Kingdom and the United States, such practices are now prohibited.Pretexting used to be a vital tool for freelance investigators, said Frank Ahearn, a former detective who does consulting on how to avoid detection, in an interview with CNN last year. "I could still do it, but I just don't, because it's illegal now," he said.News of the World appears to have exploited a mechanism in mobile-phone carriers' systems that allows people to access voice-mail messages remotely, from any phone, experts say.The episodes followed an even more primitive breach in the 1990s when the Sun, another British tabloid, published recordings of royal family members' phone conversations. Among the revelations: James Gilbey, a close friend of Princess Diana's, frequently referred to her affectionately as "Squidgy."Those unsecured mobile communications, in the days of analog transmissions, were easily tapped by amateur ham-radio operators as well.Squidgygate aside, the migration to more advanced cell phones in recent years has facilitated more sophisticated intrusions. Smartphones have become the dominant type of mobile device bought in the U.S., according to Nielsen, and are growing rapidly worldwide.With these pocket computers, intruders have myriad more entry points available to them.Two of the most common, security analysts say, involve tricking a phone user into installing poison applications or opening malicious links in their Web browsers. Attacks using the latter method are becoming ever more sophisticated because software makers provide few safeguards against them.With the proliferation of curated app stores, scammers are finding it difficult to sneak their virus-laden software onto people's phones undetected. Apple and many others, not including Google's Android, vet apps before making them available online.Software providers also maintain a "kill switch" that allows them to delete problem programs remotely from customers' phones after they've taken root. And some carriers, such as AT&T, have required that customers only install Android apps from trusted storefronts.Security researchers have long warned that cell phones are poised to be the next frontier for cyber attack."It's always been a concern," said John Walls, a spokesman for industry group CTIA Wireless. "That's why, No. 1, the carriers do invest a vast amount of resources to provide security within their own networks."For example, operators have increased the security measures in place to block junk text messages before they reach a recipient's handset, Walls said.Cell phones are "built with at least some form of protection engineered from the beginning, which was not the case with PCs," said Horace Dediu, who runs a Helsinki, Finland, mobile consulting firm called Asymco.But those protections have, in some cases, bred a false sense of security, Dediu said."People feel safer with these things," he said. "You can see that psychologic attacks (convincing someone to install a malicious app, for example) are always going to be possible."Pretexting is ultimately about social engineering, Walls said. And telecoms increasingly train customer-service workers to follow strict guidelines to keep information from falling into the wrong hands, he said.Convincing phone users to click a strange link or install an app that steals their data is also a form of social manipulation. And a relatively easy one at that, researchers say. But the mobile security apocalypse that has long been forecasted hasn't come.So far, mobile attacks have most often attempted to trick people into sending expensive text messages or making pricey phone calls to 900 numbers, because those ruses are the simplest and most lucrative, experts say.When it comes to stealing personal information, cyberthieves prefer to grab reams of private data from corporate servers, such as the recent attacks on Sony, experts say.Some security firms are working on software to protect smartphones. AnchorFree, for example, is building a program that remotely shields Apple customers from problems.Eugene Lapidous, AnchorFree's chief architect, said in a recent interview that "iPhone doesn't protect itself. So we have to provide some intermediary service in the cloud."If you regularly download apps or media files, or access shared Wi-Fi networks via your phone, CNN mobile columnist Amy Gahran says it's a good idea to purchase a mobile security package.Many mobile security packages are available for $20-$30 upfront, plus about the same amount per year. TopTenReviews.com recently published a comparison chart of 10 leading mobile security services for consumers.But security software for phones so far has mostly been an underserved and largely undesired market.While many more safeguards are in place for phones, the checklist for protecting oneself sounds similar to the handouts many corporate information-technology departments give to employees: Don't lend your equipment out; don't install suspicious programs; use common sense."We urge people, just like you would on a computer: Be wary of addresses or communications with which you're not familiar," Walls said. "It sounds simple."It is. But as unscrupulous reporters have shown, some phones can be fairly easy to crack.
almaghribtoday
almaghribtoday

Name *

E-mail *

Comment Title*

Comment *

: Characters Left

Mandatory *

Terms of use

Publishing Terms: Not to offend the author, or to persons or sanctities or attacking religions or divine self. And stay away from sectarian and racial incitement and insults.

I agree with the Terms of Use

Security Code*

phone hacking can extend beyond voice mail phone hacking can extend beyond voice mail

 



Name *

E-mail *

Comment Title*

Comment *

: Characters Left

Mandatory *

Terms of use

Publishing Terms: Not to offend the author, or to persons or sanctities or attacking religions or divine self. And stay away from sectarian and racial incitement and insults.

I agree with the Terms of Use

Security Code*

phone hacking can extend beyond voice mail phone hacking can extend beyond voice mail

 



Almaghrib Today, almaghrib today Skincare PR Performance Full Year 2017

GMT 09:22 2018 Monday ,22 January

Skincare PR Performance Full Year 2017
Almaghrib Today, almaghrib today New hunt for flight MH370 gets under way

GMT 11:03 2018 Wednesday ,24 January

New hunt for flight MH370 gets under way
Almaghrib Today, almaghrib today Modern colorful bedroom renovation

GMT 10:57 2017 Thursday ,21 December

Modern colorful bedroom renovation
Almaghrib Today, almaghrib today Puigdemont candidate for Catalan president

GMT 13:56 2018 Tuesday ,23 January

Puigdemont candidate for Catalan president
Almaghrib Today, almaghrib today Turkey detains dozens more

GMT 10:47 2018 Wednesday ,24 January

Turkey detains dozens more

GMT 07:51 2017 Wednesday ,29 November

Merkel 'horrified' by knife attack

GMT 14:24 2017 Monday ,16 October

How Trump may have set a trap for Iran

GMT 17:01 2017 Friday ,10 February

Heavy Rain to Return to Morocco Friday

GMT 10:07 2018 Wednesday ,24 January

France's Carrefour revamps operations

GMT 12:44 2018 Friday ,12 January

Ancient mining ops buildings found

GMT 09:18 2017 Tuesday ,19 December

Egypt’s government signs agreement with Switzerland

GMT 15:35 2018 Sunday ,21 January

Twitter says Russia-linked accounts more widespread

GMT 14:24 2017 Monday ,04 September

NASA astronaut comes back to Earth

GMT 07:04 2017 Wednesday ,29 November

Evacuation centres, hotels fill up

GMT 18:08 2017 Thursday ,05 October

Christmas Gift Guide - netdoctor.co.uk

GMT 12:30 2011 Friday ,10 June

Spanish police swoop on vigilante hackers

GMT 06:57 2017 Wednesday ,29 November

Egyptian minister calls for dialogue

GMT 10:11 2017 Wednesday ,29 November

Victoria’s Secret China show struts on
Almaghrib Today, almaghrib today
 
 Almaghrib Today Facebook,almaghrib today facebook  Almaghrib Today Twitter,almaghrib today twitter Almaghrib Today Rss,almaghrib today rss  Almaghrib Today Youtube,almaghrib today youtube  Almaghrib Today Youtube,almaghrib today youtube

Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2025 ©

Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2025 ©

.almaghribtoday .almaghribtoday .almaghribtoday .almaghribtoday
almaghribtoday almaghribtoday almaghribtoday
almaghribtoday
بناية النخيل - رأس النبع _ خلف السفارة الفرنسية _بيروت - لبنان
almaghribtoday, Almaghribtoday, Almaghribtoday