gadgetsAs we stumble headlong into the next generation of Web-enabled gadgets, oftentimes we look at what’s “cool” and what’s “innovative” moreso than what’s “secure.” This see-no-evil mentality has encouraged lackadaisical programmers to cut corners in the development of HDTVs, smartphones, and countless other products, which has, in turn, given rise to new avenues for hackers and scam artists.

Read More →

iphone-g1According to anti-virus and security firm, Sophos, 8000 iPhone and Android smartphones were recently hacked to form a botnet. By downloading an app called WeatherFist, unsuspecting users with jailbroken phones became vulnerable. Fortunately, in this case the botnet was not actually harmful. Instead, it was created by two researchers at TippingPoint Digital Vaccine Labs as a proof of concept experiment to prove how easy it is for these smartphones to be exploited, and just how weak the security is for third party app stores.

Moral of the story – research an app before you insist on downloading and installing it from any of these third party app stores.

(Via Download Squad)

Read More →

1255633684_paris-sidekick As our cell phones become capable of doing so much more then just making phone calls, such as downloading applications, shopping online, and even managing our bank accounts, hackers look to them more and more as a system to exploit. This is not just something we have to worry about having in the future, but this is something cell phone users need to be concerned about right now.

Russian antivirus company, Kaspersky Lab, has found a new malicious program that has already been used to part phone users from their money. This program works by hijacking Nokia phones and making small charges to the owner’s wireless account, and then sending that money to the account of the hacker.

In yet another similar incident that happened last month, an Australian student created and spread a virus on jailbroken iPhones. This virus wasn’t really harmful as it only changed the background image on the iPhone, but its purpose was to show the vulnerability of smartphones.

“The tipping point will be when we’re using the phone to shop and conduct banking,” Mr. Moss, a security expert and organizer of the Black Hat conference said. “The more you do with the phone, the more valuable a target it becomes.”

With the overwhelming amount of mobile malware popping up, a new company called Lookout has started up. Right now Lookout is testing security software for phones running Windows Mobile, and the Android operating system, and they will soon be introducing security applications for the iPhone and BlackBerry. The software will protect phones from rogue programs and it will allow the phone’s owners to remotely back up and erase data on their phones in case a phone is stolen. A user will also be able to track their phones on the web using the phone’s built-in GPS.

Lookout has been working hard to bring to the public’s attention to focus on just how vulnerable people’s cellphones really are. One of the ways they have succeeded in doing this recently, was by camping outside the Academy Awards ceremony in Hollywood, and scanning the phones of the stars walking the red carpet by using a short range Bluetooth wireless connection. They found that as many as 100 of the stars’ phones were vulnerable to hacking over such a connection, effectively proving us just how vulnerable these phones really are.

(Via NYTimes)

Read More →

spoofcard-logoThis morning the New York Post published a quick run through on how to use a Spoofcard. A Spoofcard is an inexpensive way to call someone else while having your caller ID number disguised as any number you want. It even lets you disguise your voice. But the most dubious way the service can be used is to hack in to people’s voicemail by dialing in to a number’s voicemail system with the caller ID set as the same number, effectively bypassing the need to put in a security pin first. Despite the fact that this story has been live for a mere couple of hours, the Post is already getting lots of flack for advising people how to use what some consider to be a questionably legal service.

Read More →