|
sy jumpe article ni mase tgh surf internet...
maknenye fon kita mmg takde privacy... mc takut jeee....
ade sesape tau tak mcm mane nak tau yg fon kita dah kena hack???
_____________________________________________________________________________________________________________________________________________________
KUALA LUMPUR: He was enjoying a "dirty" weekend while his wife was away.
He was cocooned in a hotel room with his mistress, blissfully unaware that the game was up.
When he returned home here on Monday, his wife was waiting — with the divorce papers.
The man, who thought he had covered his tracks, had not reckoned with software which can hack into mobile phones.
His wife had enlisted the help of a "black hacker" to listen to her husband’s intimate conversations with his mistress.
According to Sanjay Bavisi, president of the International Council of E-Commerce Consultants, the RM700 software helped nab the husband.
"She was suspicious but had no concrete evidence of his infidelity. Until she contacted a black hacker, who told her about the software," said the information security expert.
The European software, available over the Internet, was used to download a "bug" into the husband’s phone.
After that, she could control the phone via a computer.
"She recorded their conversations and he had no clue someone was listening in."
Welcome to the latest hacking technology where even the mobile phone is not spared.
The "spying" software is one of several in the market which can turn your mobile phone into a technological "snitch", recording and transmitting conversations through remote sensors.
The technical wizardry does not stop with hacking: The software can turn on the phone’s camera, snapping pictures or videotaping events.
All the while, the phone owner remains clueless.
Within minutes after the software is downloaded, the hacker can receive copies of SMS, call logs, emails, locations and eavesdrop on conversations.
The process of downloading is so simple, a hacker may borrow your phone for a few minutes and return it "hacked".
"Any mobile device such as a laptop, smart phone, PDA and BlackBerry can be a hacking ‘tool’ to access every bit of data.
"All data in such devices, every corporate data, contact list and information about your location are accessible to hackers," said Daniel V. Hoffman, author of Blackjacking: Security Threats to Blackberry, PDAs, and Cell Phones in the Enterprise.
If you are thinking of catching up with work while sipping a cuppa at the free local Wi-Fi hotspot, think again.
The person sitting behind you may be monitoring your work and downloading information in your laptop.
"When you are in a Wi-Fi hotspot and use your laptop, your data may be ‘sniffed’ by other users. This can be done by those who create a page on your screen that looks like the original but is not. This is called phishing," said Hoffman, also a senior engineer for Fibrelink Communications.
Phishers attempt to acquire sensitive information, such as usernames, passwords and credit card details by masquerading as a trustworthy entity like an online bank.
Phishing is typically carried out by email or instant messaging, and often directs users to give details at a website, although phoning is common, too.
Within seconds, information in your laptop is hacked.
When banking online, users are advised to type in the website address instead of clicking on a link.
With so much threat to information security, why are corporations not being proactive and protecting their data?
"I don’t know of any corporation that has a strategy to control mobile devices. And this is dangerous for obvious reasons," Hoffman said.
"The company’s employees are downloading corporate information into their USB drives, PDAs, mobile phones, BlackBerrys and laptops, and all this information is going in and out the door every day."
He said studies showed that almost 60 per cent of all corporate data was stored in these mobile devices and could fall into the wrong hands easily.
Users should also be careful in downloading attachments, as there may be a hidden program allowing a hacker access to the computer system.
One in 10 websites is capable of downloading malicious programs into your PC.
But not all is lost.
One can install anti-virus software, passwords, firewalls to protect the mobile phone and other mobile devices.
"You can do it the same way you would to protect your personal computer. These programs will alert you when something is happening," Hoffman said.
"Hacking can be prevented but this would depend on the person’s awareness of ways to protect himself." |
Rate
-
1
View Rating Log
-
|