tech support 14

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, 23 November 2013

5 Terrifying Smartphone Hacks You Won’t Believe Are Possible

Posted on 11:13 by Unknown
They will all be used for sure.



Global Research Report
By Teddem Yee
19 November 2013

Sometimes we fail to appreciate the fact that today, right now, we’re living in a sci-fi universe. The smartphone is a miracle of mathematics and engineering genius, converting a little over 4 ounces of inert matter into a Star Trek-level wonder computer. But the downside of storing your entire world inside a pocket-dwelling supercomputer is that there are always those who are itching to turn that technology against you in ways you’d never expect, like … 
 



#5. Your Phone’s Tilt Sensor Can Sense What You’re Typing on Your Computer


Creatas/Creatas/Getty Images

If you work a desk job, chances are you keep your smartphone handy on your desk while you’re working. And why not? If you get a call, it’s hard to pull your phone out of your pocket with your butt custom molded and sweat glued to your chair. The whole point of a mobile phone is convenience, so there’s really no reason not to keep it right there by the keyboard.

That is, there wasn’t until a cadre of supervillains (ahem, “researchers”) from Georgia Tech decided to create a program that turns your innocent-looking smartphone into a nosy little that sits there spying on your every keystroke. Passwords, email messages, IMVU chats — your phone could be eavesdropping on all of it. You might suspect that some kind of camera or microphone hack is at play here, but the real modus operandi is even sneakier: As you clack away on the keyboard, your phone’s accelerometer can pick up the tiny impacts resounding through your desk and, based on the distance of the keys from the phone, mathemagically deduce which keys you’re stroking.

Phones with motion sensitivity on the level of an iPhone 4 can guess what you’re typing with up to 80 percent accuracy. And this clever bit of spyware can easily Trojan horse its way onto your phone as part of an otherwise trustworthy-looking app, since it doesn’t arouse your tinfoil-hat suspicions by asking for permission to use your camera or microphone. The humble tilt sensor is rarely protected against privacy intrusions, because who would ever have guessed that the little gizmo that flips your screen over when you turn your phone sideways could also be used as a goddamn drunken Facebook status update interceptor?

Of course, the algorithm for figuring out what you’re typing based on tiny desk tremors is mind-bogglingly complicated, and the whole system is easily defeated by … just not setting your phone next to your keyboard, so the chances of such an attack by your local garden-variety hacker are low. But since we already know that the government is trying to listen in on us at all times, we’re typing up this article with a phone next to the keyboard just to let them know that we know.

#4. Smartphones Can Steal Your Credit Card Information Just by Being Near Them



Ryan McVay/Photodisc/Getty Images

By this point, you might be ready to chuck your smartphone out the nearest window and go back to living without one like folks did in the Stone Age (the ’90s were the Stone Age, right?). The only problem with that strategy is that every smartphone out there is a potential threat to you whether you own one or not. For example, did you know that any old Joe Android can brush against you in a grocery store and remotely steal the data right off your credit card with his phone? And that once that information is on his phone, he can wave it at a register and pick up $300 worth of Slim Jims and Mountain Dew on your tab?

Don’t worry, not all of your cards are vulnerable. But if you’re one of the millions of people carrying a futuristic “contactless” card — the kind you just wave in front of a terminal to pay for stuff, such as American Express’ ExpressPay — then you’d better keep that in a lead-lined wallet because, as you may have already realized, they’re designed to have their radio chips scanned from inches away.

That means all it takes is a modern phone with near field communication (NFC) capabilities and a special scanning program, and voila — a crook can use thief magic to pass right through a solid wallet to steal your credit card with goddamn radio waves, and you don’t even get the satisfaction of a fleeting grope. Yep, in our technological age, even the intimate act of digging inside a stranger’s pocket has become detached and impersonal for the sake of convenience.

Now, before you ask: Yes, someone has already created this, and yes, you can totally download it for free if you know where to look. The program’s creator, Eddie Lee, demonstrated the hack with his own phone at DefCon 2012, then released his simple app on the Internet as a flashing ” fix this!” sign to credit card companies.

The program is also capable of shipping card data to someone else’s phone, meaning you can go on a shopping spree on Madison Avenue with a card your buddy just swiped from Sunset Boulevard. Now that’s modern convenience, folks!
 

#3. Fake “Free Charging” Stations May Be Waiting to Ambush You


John Foxx/Stockbyte/Getty Images

Imagine this: You’re sitting at a coffee shop, preparing to Vine about the horrific lack of a design in the foam of your cappuccino, when your phone suddenly alerts you that it’s down to 2 percent power. Holy shit, tragedy has struck! Not a single wall socket in sight — but hey, is that a free cellphone charging kiosk over there? Thanks, modern convenience!

So you hook up to the free charger, the battery indicator flares back to life, and the world narrowly averts missing out on your latest coffee-related outrage. Meanwhile, a hidden device that a “technician” packed inside the charger is casually mining your phone for personal data, stealing all your saved passwords and bathroom mirror self-portraits, and probably slipping you some nasty phone STDs for good measure. Smooth move, moron — you just did some lowlife a big convenience by plugging your phone directly into his phone-hacking machine.

Don’t feel too bad for being fooled, though. In 2011, over 360 people fell for the same trick at the DefCon convention in Las Vegas. And in case you’ve never heard of it, DefCon is a conference for professional hackers and security experts from around the world. That’s right: A convention full of actual hackers was easily taken in by this so-obvious-nobody-expected-it ruse. Fortunately, the kiosk was operated by Aries Security, and instead of actually snatching data from everybody’s phones, the kiosk displayed an educational message reminding these security “experts” not to plug their phones into a random box at a hacker convention.
 
This ploy is known in the security industry as “juice jacking,” a term we’re pretty sure they borrowed from the porn industry. Based on the same concept as ATM skimming, a criminal could set up a fake phone charging station (or tamper with an existing one) to immediately steal your data, or install a program on your phone to steal it later.

While charging stations in high-profile areas like airports and shopping malls are probably safe, fake charging stations (just like fake ATMs) could crop up anywhere — especially with numerous no-name companies renting them out to special events. Your best bet to avoid such a disaster? Carry your own cord and find an electrical outlet of the plain old-fashioned variety. Or, you know, maybe just learn to cope with the hardship of missing a prime tweeting opportunity every now and then.

But really, just stealing the data off your phone is minor when you consider …

#2. Fake Cell Towers Can Turn Your Phone into a Remote Listening Device



Photodisc/Photodisc/Getty Images

So you’ve invested in the most obnoxiously tank-like OtterBox money can buy, you don’t go around stuffing random cords into your phone-holes, and, for what it’s worth, you’ve kept your phone’s antivirus software up to date. When it comes to mobile security, your smartphone is absolutely watertight.

… but is it airtight?

Ralf-Philipp Weinmann of the University of Luxembourg discovered that hackers can infiltrate your phone through the airwaves themselves, completely bypassing your operating system and antivirus software to hack directly into the radio processor. This aerial attack requires a special box that acts like a cellphone tower and tricks your phone into thinking it’s connecting to a real network. Once the connection is made, the infection juice starts a-flowing, giving the hackers access to everything that the radio processor controls. And since this processor is in charge of handling phone calls, that means the hackers now have your dialer and your microphone — and on some phone models, possibly your camera, too.

Weinmann presented his technique at the Black Hat conference in 2011 (presumably while wearing an Abe Lincoln-style stovepipe), demonstrating how a phony cell tower can remotely and silently “answer” your phone and broadcast any conversations within earshot to prying ears. Yes, kind of a crude version of what Batman was using in The Dark Knight. But you don’t have to be as rich as Bruce Wayne to wield this kind of power: The same brand of tower was set up at Burning Man 2008 for about $4,500.

Pretty scary stuff, but it gets better … 


#1. Big Brother Can Use Your Phone to Spy on You in 3D 



Thinkstock/Comstock/Getty Images

Yes, it’s the actual Dark Knight device — one that generates a complete 3D image of the inside of any building. Disguised as a harmless camera app, PlaceRaider secretly snaps random pictures as you go about your day. The pics are then shipped off to a central server to be analyzed and compiled into a detailed model of your home, office, or terrorist stronghold.

So it’s also kind of like that scene in Iron Man 3 where Tony Stark uses a bunch of images from a suicide bombing to recreate a 3D view of the crime scene, the only difference being that …

In fact, Iron Man’s fictional technology falls a little behind the curve this time, considering that PlaceRaider (developed by the U.S. military) was already developed, tested, reported, and published by the fall of 2012. The test runs were a smashing success, by the way: PlaceRaider was put in the hands of unsuspecting phone users in an office setting, and in addition to rendering a detailed view of the environment, the resulting images captured computer screenshots, account numbers on checks, and random loose documents.

The idea is that the malware could be embedded in a camera app like Instagram so that it wouldn’t raise any red flags when the app asks for permission to access your camera. Then, in practically no time at all, a burglar’s virtually strolling through your home — browsing through your family photos, scanning your wall calendar with “VACATION” scrawled across it in red Sharpie, jotting down the exact locations of your valuables, even seeing close-up detail of what the keys in your pocket look like …

Wait, we may have just stumbled across the biggest weakness of PlaceRaider: Seeing as how most smartphones spend the majority of the day buried deep inside their owners’ pants, the ne’er-do-well on the receiving end would likely end up sifting through piles of detailed 3D renderings of pocket lint and crotch bulges. Maybe we’re panicking a bit prematurely on this one.


original article found here
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home
View mobile version

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Mongol invasion: Inside the most powerful bikie gang in Australia
    American exports. Organized American Crime has gone to Australia. Mongols bikie gang. Picture: News Limited Source: NewsComAu T...
  • The Subversive Sayanim Amongst Us
    Israel continues to pollute the world. Just Wondering by Zen Gardner 28 October 2013 This is a very hot topic that gets taken down off the n...
  • New Xbox Can See Through Your Clothes Like TSA Scanners
    I wonder how sales will fare? Parents won't like it and I imagine many gamers will not want to see themselves either and of course there...
  • Quantum physics proves that there IS an afterlife, claims scientist
    For the unenlightened, and so mindless Doctrinaire God Botherers, an interesting article to read, with an Open Mind? Robert Lanza claims th...
  • Americans Are Finally Learning About False Flag Terror
    If only! The eyes of many parties are starting to open and people are starting to question and perhaps it will cause people to act indivi...
  • IMF Pushes Plan to Plunder Global Wealth
    Not content with having abused the wealth of nations, being riddled with corruption, a history of Gross Incompetence, the IMF now want to se...
  • Record Saudi Arabia oil output fills supply gap
    Record production and still cash is short. Financial Times 16 September 2013 The US might be drowning in oil, but the world is still depende...
  • 25 Fast Facts About The Federal Reserve – Please Share With Everyone You Know
    The reality of the Fed and Fiscal crisis becomes ever more gruesome.  The Economic Collapse By Michael Snyder 15 September 2013 As we approa...
  • New Snowden docs show U.S. spied during G20 in Toronto
    It never ends. CBC News By Greg Weston, Glenn Greenwald and Ryan Gallagher 27 November 2013 Top secret documents retrieved by U.S. whistlebl...
  • Warning - NSA To Oversee Individual Bank Accounts & Wealth
    This will become a a nightmare. They will sequestrate all you have at will. Exactly why Agencies need a 50% budget cut. King World News By E...

Categories

  • Books
  • Exclusive
  • Humor
  • Saturnalia
  • Video

Blog Archive

  • ▼  2013 (500)
    • ►  December (2)
    • ▼  November (184)
      • 3300 Missile Warheads Intercepted Close To Home: W...
      • Elizabeth Warren: The Contender
      • China to Provide Uzbekistan $350M for Crucial Rail...
      • EU banks are on the verge of liquidity crisis
      • Russia Plans to Launch 11 Military Satellites By 2015
      • Why China is fixated on the Moon
      • A substantial prehistoric European ancestry amongs...
      • Drummer Lee Rigby was 'hacked like a joint of meat...
      • Forget About Stashing Your Cash in the Cayman Islands
      • DRDO Planning to Test-fire High-altitude 'Killer' ...
      • The National-Security State’s Childishly Dangerous...
      • GSDF spies have secretly worked abroad without inf...
      • China Declares "Willing To Engage In A Protracted ...
      • The Jesuit Agenda
      • Detroit: The Conspirators Behind the Largest Munic...
      • Homeland Security's Latest Nuclear Defense System ...
      • New Snowden docs show U.S. spied during G20 in Tor...
      • China Is On A Debt Binge And A Buying Spree Unlike...
      • Expect Devastating Global Economic Changes In 2014
      • N.S.A. May Have Hit Internet Companies at a Weak Spot
      • America Lives to Fight Another Day
      • Take the Money and Run: China's Ill-Gotten Wealth ...
      • Bitcoin working with the US government?
      • Angola bans Islam and shuts down all mosques acros...
      • Iran Deal Nullifies Needs for Europe Missile Shiel...
      • Pope Francis, Putin Discuss Syria Solution in Vatican
      • Special Report: How China took control of an OPEC ...
      • You Think You Know Someone, and Then He Gets on a ...
      • Jerusalem, Riyadh stunned: Obama makes Iran 7th wo...
      • The Darkest Hour is Before the Dawn
      • Commentary: Li's visit to lift China's ties with R...
      • Map Shows The NSA's Massive Worldwide Malware Oper...
      • Americans Are Finally Learning About False Flag Te...
      • Banks Warn Fed They May Have To Start Charging Dep...
      • A Confused World Reacts To The Iran Nuclear Deal
      • Obama’s Fight With Israel: This Time It's Serious
      • Revealed: Arnon Milchan - the Hollywood producer b...
      • Google to create a fashionable, prescription lense...
      • China creates air defence zone over Japan-controll...
      • LIST OF NAMES — Military Purge High Officers — Ter...
      • 5 Terrifying Smartphone Hacks You Won’t Believe Ar...
      • Drones deployed to all seven PLA military regions:...
      • Russia forming rapid deployment force
      • ObamaCare: The Neutron Bomb That Will Decimate the...
      • Europe in shock as Ukraine kills integration plan,...
      • Exclusive: 'Dozens' of Terrorists May Be in US as ...
      • Pakistan’s Imran Khan to Block NATO Supplies After...
      • Fed Minutes Reveal a Dangerous Power Grab by New Y...
      • China Announces That It Is Going To Stop Stockpili...
      • Luxembourg, Cyprus, BVI, Seychelles fail tax trans...
      • The ticking time-bomb at the bottom of the Baltic Sea
      • Global Power Structures: Symbolism Report #1
      • NSA Locations
      • America Has Entered a New Level of Tyranny
      • Warning - NSA To Oversee Individual Bank Accounts ...
      • AIR FORCE ONE
      • Lord James gets mooned
      • Secret TPP Negotiations Resume in Salt Lake City
      • RPT-Yellen set to move closer to confirmation as n...
      • US and UK struck secret deal to collect innocent B...
      • US troops could stay in Afghanistan until 2024 - s...
      • Gary Locke receives kind parting words from old fo...
      • Xi thanks Clinton for furthering ties
      • The "Obamacare Shock" - One California Employer's ...
      • How Washington D.C. Is Sucking The Life Out Of Ame...
      • LG TV phones home with your viewing habits, names ...
      • Financially strained Venezuela reportedly cuts gol...
      • NHTSA May Mandate That New Cars Broadcast Location...
      • Longwave Group: Economic Winter Vol.57 Issue 1 - C...
      • China central bank suggests faster tempo for freei...
      • Yahoo to add encryption to all services in wake of...
      • NSA monitored 33m phone calls in Norway: Snowden
      • British Intelligence Operation to Kidnap Snowden? ...
      • Wal-Mart Asks Workers To Donate Food To Its Needy ...
      • DC official fired after criticizing Obama change
      • Corrupt Bank Officials Get Death Sentence in Vietnam
      • Behind the Pentagon’s doctored ledgers, a running ...
      • Dem Senator: 'We All Knew' Obama Was Lying
      • How Britain's Biggest Racists Created Zionism
      • Humor: Careful what you ask Grandma!
      • The Internet Is Now Weaponized, And You Are The Ta...
      • Countdown: US Hits Debt Ceiling in 84 Days
      • Senate Poised to Fund Programs the Military Doesn’...
      • Police departments have NSA like spying powers for...
      • Today Thousands March Against Mainstream Media
      • Security Expert: “Buy American Doesn’t Sell Well A...
      • BOMBSHELL! Diplomatic Agent Reveals That Benghazi ...
      • Meetings: Team Arpaio Put Congress On Obama ID Fra...
      • Humor: Sibbarpsrevyn
      • New Obamacare Tax: Sell Your Home, Help Fund Obama...
      • Articles of Impeachment Introduced to Oust Attorne...
      • Billions of Taxpayer Dollars Funding Insurgents in...
      • New Xbox Can See Through Your Clothes Like TSA Sca...
      • EU uses new budget powers to demand more austerity...
      • Quantum physics proves that there IS an afterlife,...
      • Humor: It rears it's truly ugly head
      • BREAKING: Democrats Give Obama 72 Hours To Fix Hea...
      • China to Ease 1-Child Policy and Abolish Labor Camps
      • Your Phone Number Is Going To Get A Reputation Score
      • Top Ten List of America's Stupidity.
    • ►  October (192)
    • ►  September (122)
Powered by Blogger.

About Me

Unknown
View my complete profile