The Top 10 Threats to Your Smartphone

“Although some of the samples are oriented towards profit, by sending text messages or phoning to premium-rate numbers, the wide majority [are] focused on extracting personal information from the device, such as contacts, text messages, browser history and GPS location.”

Here are the top 10 terrible threats that smartphone owners should be aware of. 


A short text-messaging variation on phishing attacks, smishing uses text messages to trick victims into calling a fake bank or credit card company and divulging his or her account number and password, under the pretext of needing to confirm a purchase or update security settings. When the customer calls the texted number, a voicemail system set up by the cybercrook records the account number and password.

War Texting

First demonstrated on connected car systems, such as GM’s OnStar, that allow owners to remotely unlock or start their vehicles, war texting is a hacking technique that sniffs out the codes used to communicate between a smartphone and a car. Once the codes have been uncovered, the hacker can unlock and start the vehicle without a key. In some cases, the criminal may also be able to track the car if someone else is driving it.


Wi-Fi Hijacking

Everyone wants a free ride, so some hackers set up free Wi-Fi hotspots in public places such as parks, cafes and airports. Unsuspecting users who log onto the hot spot are then monitored for passwords, credit card numbers and account information.

Open Hot Spot

Conversely, many smartphone owners use their own phones to create an instant hot spot so that their laptops can get online. That’s fine, as long as one creates a strong password requirement (letters and numbers) to sign into the hot spot. Otherwise, hackers may be able to gain instant access to your connection and your communications.


Baseband Hacking

A sophisticated method of intercepting cellular calls, baseband hacking exploits vulnerabilities in the chips and firmware used in both iPhones and Android-based smartphones. Such attacks use the phone’s baseband processor to turn it into a listening device that allows the intruder to eavesdrop on conversations. However, it requires knowledge of the firmware in these phones, as well as setting up a temporary cellular node (essentially, a fake cellular tower).

Bluetooth Snooping

Bluetooth device-pairing default passcodes for smartphones are usually “0000” or “1234.” For convenience’s sake, many users never change the defaults; that’s a mistake that can give an attacker access to all your messages and contacts. Additional Bluetooth attacks have also been demonstrated — so-called “fuzzing” attacks — that overwhelm and crash a device using Bluetooth signals.

Hidden URLs

Text messages, Facebook postings and Twitter tweets are rife with shortened URLs , thanks to services such as Bit.ly. Unfortunately, shortened URLs are being used to hide malicious sites and software, leading surfers astray to porn sites, spam pages and worse.

A Few Bad Apps

Back in March, a major malware infection occurred on many Android phones. Hackers used a Trojan known as Droiddream and hid in it as many as 50 different rogue apps. The applications looked legitimate because the program piggybacked on real apps which were available in the official Android Market.

The One-Minute Attack

The problem with smartphones is that they are always on, which means that a smart hacker can attack quickly and get out before the victim is aware anything is wrong. That’s the idea behind Android.Spyware.GoneSixty.Gen , recently discovered by Bitdefender. Once installed on a phone, it sends all messages, recent calls, browsing history and other information to a remote location — and then uninstalls itself. All this takes place in less than 60 seconds.

Message Forwarding

Simple, but effective, this is how a Florida man allegedly got hold of those compromising pictures of Scarlett Johansson . A weak password — one based on, say, a pet’s name or a childhood address — enabled him to hack into the Hollywood star’s email account and then set it to automatically forward all incoming and outgoing emails to him. Researchers say hackers are now focusing on using the same technique to hack into smartphones in order to extract important corporate data and industrial secrets.

Source: SecurityNewsDaily


PC Tech

Posts on this account are made by various editors.
Back to top button

Adblock Detected

Please disable your adblocker to continue accessing this site.