Methods of PHONE HACKING: 1. Caller ID Spoofing: A system - TopicsExpress



          

Methods of PHONE HACKING: 1. Caller ID Spoofing: A system which masks the caller from its recipient by displaying a different phone number on the caller ID. Similar to e-mail spoofing which uses different e-mail address as a mask. 2. Location Eavesdropping: Commonly used in social medias like Facebook and Foursquare which allows location check-ins. Hackers may target checked in locations and eavesdrop the conversations. In a worst case scenario, a hacker may work with burglars after confirmation that the target is not home and the house is vacant. 3. SMS Spoofing: New hacking technology to mobile technology which allows the sender to replace his/her mobile number with alphanumeric text. SMS spoofing have legitimate uses but can cause great damage to the recipient. a. The recipient of the SMS spoofing my incur termination charges as if received from a foreign network b. The SMS spoofing may use a real subscribers number incurring sending charges as if they were in a foreign country c. Recipients may complain about spamming and possibly deflects sending of messages unless repaired 4. Malicious Software: Still being used by hackers as a technique to break security and cause multiple illegal functions such as intercepting calls or sending information (SMS, emails and passwords) and then transmitting it to another device. Having security software installed increases protection to users private information stored in the smartphone. 5. Identity Stealing: Apps are very popular in smartphones and users may have tens to thousands of this installed. Fake apps give hackers the opportunity to access and steal all sorts of information about the phone, messages and data. Security programs are highly encouraged to prevent malwares and apps but should only be downloaded from trusted sources. 6. Pretexting or Blagging: Act of creating invented scenario such impersonation to engage targeted victim to divulge information or perform actions unlikely to happen in ordinary circumstances. Data that can be divulged includes addresses, phone bills, bank statements and health records. 7. Wireless Hijack: Wireless devices are great ways for transferring data files and can also be used for hacking. Wi-Fi and Bluetooth are vulnerable to hacking which can expose personal information of the target. 8. Cloning: Phone cloning allows hackers to receive calls and messages of the original device once turned-off. It requires special kits and techniques; it is not easy but can be done. 9. FlexiSpy and Phone Tapping: Normally, landlines are hacked by physical connection through terminal boxes and cables. However, more modern methods use a software called FlexiSpy to eavesdrop messages and voice calls to a Web site which allows access to stored data. Although banned in some networks, it has been used by parents to monitor their kids calls. 10. Mobile Phone Tap: Various software allow remote listening to all phone conversations which are picked up through broadcast signals. Hackers may find these software difficult to obtain but it definitely exist. Mobile Phone Pinging: Pinging a cell phone traces what cell tower the device is in. It is used by an agency by triangulating the approximate location of the mobile phone. It is not open for public use but hackers can tap into it and GPS makes it more dangerous for it can be used to trace a mobile phone even the device is turned off.
Posted on: Fri, 29 Aug 2014 14:43:27 +0000

Trending Topics



Recently Viewed Topics




© 2015