Current Weather @ 11:10 AM Clear skies Temp 75.7º Humidity 5% Winds W 9.0mph Max Gust 16.1mph
Todays Extremes High 76.3º Low 63.7º Rain 0.00" Rain Rate 0.000" per hr Snow 0.00" Season 0"
LATEST ALERTS (whats this?)
None at this time
Welcome
Username:

Password:


Remember me

[ ]
[ ]
ROADS AND TRAFFIC
Updated: 11:00 AM v2.5
Run Spr to Highland  (330): 26 mins  
Highland to Run Spr  (330): 27 mins  
Big Bear to Run Spr    (18): 22 mins  
Run Spr to Big Bear    (18): 22 mins  
Big Bear to Redlands  (38): 69 mins  
Redlands to Big Bear  (38): 72 mins  
Big Bear to Lucerne    (18): 36 mins  
Lucerne to Big Bear    (18): 37 mins  
=Light  =Moderate  =Heavy Traffic
Road Conditions Page: Click Here
Online
Guests: 408, Members: 14 ...
MrOwl
BusterBrown
holeinbow
doo·hick·ey
BaughHumbug
iladyofthelake
Odie6
Polar 🌌rbit
Quakes🦊
Local1864
cricket
rebug
mountainart

most ever online: 2417
(Members: 45, Guests: 2372) on Jul 03 : 04:58pm

Members: 6224
Newest member: bigbear1242
SUPPORT SCM!
Support SCM by making a single or recurring donation.

Member's Birthdays:
No birthdays today

Upcoming Birthdays:
Jul 15 DesertRat
Jul 16 rdiazfam6
Jul 16 Frogman
Jul 17 Black Widow
Jul 18 shamari
Jul 18 Kataleen
Forums
Socalmountains.com :: Forums :: COMPUTING FORUM
<< Previous thread | Next thread >>   

All the reasons why cybercriminals want to hack your phone

Author Post
Delj
Thu Jan 10 2019, 07:01PM Email Thread Print View
Joined: Fri Oct 05 2007, 10:18AM
:
Posts: 2048
When people think of hacking, most imagine desktop computers, laptops, or perhaps even security cameras. However, in recent years, cybercriminals have expanded their repertoire to include smartphones, too. Here are 10 reasons why they may be looking to hack your phone.
1. To infect it with malware
Many smartphone users assume they can stay safe from malware and other threats by installing antivirus apps on their phones and being extra careful about the websites they visit. They typically don’t expect their phones to have malware out of the box. However, researchers showed that’s what happened with more than three dozen Android models, typically from lesser-known brands.
The phones had Trojan malware installed on them before they reached users, and the culprit appeared to be a software vendor in Shanghai that was a shared reseller for a brand of antivirus software. Although it’s not clear what the hackers wanted to do after infecting the phones, the malware was particularly hard to remove. Often, it involved fully reinstalling the operating system.
2. To eavesdrop on calls
People use their phones to speak to loved ones, discuss business plans, talk about their travels—all manner of personal, intimate content. So, it’s not surprising that criminals would want to break in and listen, whether to case a target or simply for voyeuristic pleasure. But how do they do it?
There’s a flaw in US cellular exchange, the vulnerability known as SS7, which allows hackers to listen to calls, read texts, and see users’ locations after learning their phone numbers. Even though US agencies know about the issue, they haven’t taken decisive action to fix it, leaving Americans’ phone privacy at risk.
3. To steal money
Ransomware attacks cause headaches for computer users by making the affected machines lock up or holding files hostage until people pay the ransom to restore access. Even then, paying doesn’t guarantee a return to proper functionality. Ransomware doesn’t only affect computers, though. There’s a recent trend of mobile ransomware, which often originates from malicious, third-party apps.
In one example, a third-party app promised to optimize the Android system but actually tricked people into transferring $1,000 from their PayPal accounts. The login process was legitimate, so it wasn’t a phishing attempt. However, once people logged in, a Trojan automated the PayPal transfer.
4. To blackmail people
The crime of blackmail isn’t new, but threat actors recognize that the small computer in people’s pockets and purses likely has more personal information stored in it than a desktop or laptop. And they are able to first cut people off from accessing their phones before then threatening to leak the information they find.
Criminals may start the hack after obtaining some personal information from a victim that available on the black market due to a previous, unrelated breach. They then use that information to contact the victim’s phone company and pose as the user, saying that they want to transfer the number to a new phone. Phone companies often provide such services and can automatically transfer information, including phone numbers, to a new device. The trouble is that in this case, the old phone still works but it’s useless to the person who owns it.
After hackers take over a phone in this way, the stage is set for more serious crimes—blackmail among them. If a person had essential numbers in their phone not backed up elsewhere, they could easily feel pressured to cave into hackers’ demands to avoid worse consequences.
5. To damage your phone
Hackers feel they’ve accomplished a goal by causing chaos for victims. One way to do that is to make the phone overheat and ultimately ruin it. Security researchers warned that hackers could break into a phone’s processor and use it for mining cryptocurrency. In addition to making the phone slow down, it can also cause the phone to get too hot or even blow up!
There are many reliable cooling devices used in cell phones for temperature management, even “intelligent” temperature management solutions that heat up your phone’s battery when it’s too cool and cool it down when it’s too hot. However, if hackers have their way, even those normally sufficient internal components could fail to keep the device cool enough.
One type of the cryptomining malware called Loapi is often hidden in apps that appear as downloadable games. Security researchers ran a test and found it actually made a phone battery bulge due to excessive heat after only two days.
6. To threaten national security
Countless analysts have chimed in to say that President Trump’s alleged use of insecure mobile devices could help foreign adversaries glean information about the United States that could threaten the nation or at least give information about the president’s intended actions.
In 2018, Billy Long, a Republican congressman, had his mobile phone and Twitter account hacked. Cybercriminals know that one of the primary ways politicians interact with followers is through social media.
Besides threatening national security more directly, these hackers could erode the trust politicians have built with their audiences, especially with fake posts that seem to come from the genuine account owners.
Cybercriminals know that by hacking the mobile phones and social media accounts of politicians, they are contributing to the overall public opinion that politicians cannot be trusted. Instead of looking to the source for information, users might instead look for news via sources that are even less reliable or strategically crafted to spread fake news.
7. For fun or notoriety
Some hackers get a thrill by successfully pulling off their attacks. Hacking is a source of entertainment for them, as well as an ego boost. If money isn’t the primary motivator for cybercriminals, then notoriety is might be a close second. Hackers may get into phones because it’s a newer challenge that might require more cutting-edge malware development techniques. Ultimately, many cybercriminals want approval from others in the industry and desire their respect.
8. To get payment information
E-wallets, which store payment information inside smartphone apps so people don’t have to carry real credit or debit cards, are convenient. However, their rising popularity has given hackers another reason to target phones.
Often, cybercriminals entice people to download fake mobile payment apps (of course believing they are real). Then, once people enter their payment information, hackers have the information needed to charge transactions to the cards.
9. Because so many people use it
Since hackers want their attacks to have significant payoffs, they know they can up their chances of having a major impact by targeting smartphones. Information published by the Pew Research Center shows 95 percent of Americans own smartphones. To put that in perspective, only 35 percent of the population did in 2011, when the organization first conducted a survey on smartphone ownership.
Also, different research from another organization reveals that mobile Internet usage is overtaking desktop time. People are becoming increasingly comfortable with using their smartphones to go online, browse, and even shop. As such, no matter what kind of hack cybercriminals orchestrate, they can find plenty of victims by focusing on smartphone users.
10. Because it’s an easy target
Research shows that mobile apps have rampant security problems. This gives criminals ample opportunity to infiltrate insecure apps rather than the phones themselves.
In one case, about 40 of the top 50 shopping apps had at least a few high-level security vulnerabilities that allowed hackers to see personal information or deceive users by luring them to dangerous apps that were copies of the originals.
Further research about problematic dating apps found that many of them give third parties access to unencrypted data through vulnerable software development kits (SDKs). Hackers know some apps achieve hundreds of thousands, or even millions. of downloads. If they can break into them, they’ll get fast access to the phones that have those apps installed and the people who use them.

How to stay protected
These examples show that hackers have a myriad of reasons to hack phones and even more ways to make it happen. One easy way to protect against attacks is to avoid third-party app stores and only download content from the phone’s legitimate app stores, such as Google Play or iTunes. However, threat actors can penetrate those platforms, too, and many an infected or rogue app has made its way through.
It’s also smart to keep tabs on phone statistics, such as battery life and the number of running apps. If those deviate too much from the norm, that’s a sign hackers may be up to no good in the background.
Running a mobile antivirus scan at least monthly, or installing an always-on cybersecurity program is another good strategy, but only if the application comes from a trustworthy source, such as the vendor’s official site.
Instead of being overeager to download new apps, people should ideally exercise caution and only do so if numerous sources of feedback indicate they are free from major security flaws. Some app development companies are in such a hurry to get to the market with their latest offerings that they do not make security a priority.
Besides these more specific tips, it’s essential for people to be highly aware of how they interact with their phones. For example, strange pop-ups or redirects in a phone’s browser, or random icons appearing without having downloaded a new app could indicate problems, and individuals should not assume that everything’s okay. When in doubt, it’s best to stop using the phone and get some answers—before hackers learn all they need to know about you.

To every man is given the key to the gates of heaven; the same key opens the gates of hell.
Back to top
©ammy ⭐
Fri Jan 11 2019, 05:47PM


Joined: Sat Aug 19 2006, 06:01PM
:
Posts: 13158
Thanks Delj - good info in there!
Back to top
NShore.Allen
Fri Jan 11 2019, 07:36PM

wanna be UTH
Registered Member #4616
Joined: Sat Jul 28 2012, 04:37PM
:
Posts: 2401
Two factor authentication for all important logins.. while not 100% effective, makes hacking tougher. Use really complicated passwords

Also, freeze your credit. Don’t rely on Life Lock

A smile is a curve that can set things a lot of things straight
Back to top

Moderators: Craig ⭐, EnglishMuffin, Delj, Benny ⭐, Cam

Jump:     Back to top

Powered by e107 Forum System
Chatbox
You must be logged in to post comments on this site - please either log in or if you are not registered click here to signup


doo·hick·ey
Jul 14 : 10:59am
Maybe one of the webcams can get a fuzzy shot of NEOWISE.

SCM ALERT🚨
Jul 14 : 10:40am
[CHP DISPATCH] CRESTLINE - TRAFFIC ACCIDENT 1900 HIGHWAY 18 N SBD 19.00 10:38AM [10] MESSAGE DELIVERED SBCOMM AS PRECAUTION
10:36AM [6] REPORTING PARTY ADVS A ROCK SLID DOWN FROM THE MOUNTAIN AND HIT A GREY SUV ---THERE WAS AN FEMALE OUT OF VEHICLE SCREAMING FOR HELP Updates: http://socalmountai

doo·hick·ey
Jul 14 : 10:38am
Did you get the launch alert email?

"Beginning tonight, a comet may be visible to the naked eye low in the west about an hour after sunset. For details, go to:

[Click Here]

Please note the comet was previously in the dawn sky but has since moved into the dusk sky."

You have to be up real high to see it on the horizon.

SCM ALERT🚨
Jul 13 : 11:35pm
[FIRE DEPT DISPATCH] VEGETATION FIRE
SAN BERNARDINO ICHG NB 215 > WB 210 - SBOC ICHG NB 215 > WB 210 X I 215 S/I 215-STATE 210 ICHG
BC129 ME222 ME224 BE227 BE75 GHC15-1 GHC15-3
More Info: Click Here
Live Scanner: Click Here

SCM ALERT🚨
Jul 13 : 10:21pm
@CITYBBL: New COVID-19 update includes: 5 new confirmed cases over the last three days and Governor Newsom imposes restrictions that limit businesses to outdoor activity only.

Click the link to read more: [Click Here] [Click Here]

Benny ⭐
Jul 13 : 09:49pm
Yeah that's kind of evil... well they'll figure it out when they get up there! Should setup a digi-sign down the hwy. But whatcha gonna do.

SCM ALERT🚨
Jul 13 : 08:43pm
[INCIDENT UPDATE]
VEGETATION FIRE in MOUNTAIN HOME VILLAGE
Units On Scene Thurman Flats Picnic Area. Small Fire. Units On Scene CAN HANDLE - CANCEL Any Units Not On Scene - Requesting Sheriff To Respond To The Incident. More Info: [Click Here]

SCM ALERT🚨
Jul 13 : 08:17pm
USFS: Happy #NationalForestWeek!

Did you know theres a photo contest with prizes? 📸👀 [Click Here]

SCM ALERT🚨
Jul 13 : 08:13pm
[FIRE DEPT DISPATCH] VEGETATION FIRE
MOUNTAIN HOME VILLAGE STATE HWY 38 / KILKARE RD - MTH X
BC131 WT99 BE9 BP98 BE227 OES8638 WT78 GHC15-1 GHC15-3 D2 VHFTAC CALCOM FEDCOM

More Info: Click Here
Live Scanner: Click Here

KrazyKristin
Jul 13 : 07:44pm
When I worked at Elkhorn General Store they would push us to sell Adventure Passes even when we knew the lot was closed. I refused to do it.

KrazyKristin
Jul 13 : 07:42pm
Hey Benny. I heard about those hikers, but these are people just coming up thru town and I'm sure no one at the store is telling them the parking lot is closed.

Benny ⭐
Jul 13 : 07:21pm
Kristin, I believe there were some hikers that had gone up this morning well before the fire, now having trouble getting back down through the fire zone. The area is now closed, at least temporarily.

SCM ALERT🚨
Jul 13 : 07:19pm
[INCIDENT UPDATE]
VEGETATION FIRE in VALLEY OF THE FALLS
#ValleyFire Update (Forest Falls) Forward Rate Of Spread Has Been STOPPED At Around 1 Acre. Crews Will Continue To Work On Containment Of This Remote Fire. More Info: [Click Here]

MtnBluebird
Jul 13 : 06:47pm
What's going on the backside of Sugarloaf park? Caution tape and two sheriff's.

KrazyKristin
Jul 13 : 06:30pm
So the Forest Falls rec area is closed because of the fire but people are still driving up there and walking up there. ??!! I don't get it.


Latest Forum Posts
Posted by Local1864 in GENERAL DISCUSSION
L (Jul 14 : 11:10am)

Posted by Nature in GENERAL DISCUSSION
Thank you Quantum.Agreed Humbug. (Jul 14 : 09:34am)

Posted by BaughHumbug in GENERAL DISCUSSION
At last night's city council meeting, city manager Frank Rush stated that he kne (Jul 14 : 09:00am)

Posted by wisteria1 in GENERAL DISCUSSION
COVID testing is available four days a week at MCH in Lake Arrowhead. Doesn't sa (Jul 14 : 07:16am)

Posted by QuantumBear in GENERAL DISCUSSION
Nature wrote ...Please correct me if I’m not calculating this correctly.In the n (Jul 14 : 07:13am)

Posted by Jellylorum in GENERAL DISCUSSION
Be careful out there.I was advised by my doctor's office yesterday that tests ar (Jul 14 : 07:08am)

Posted by Jellylorum in GENERAL DISCUSSION
July 9 BB had 19 cases. 4 days later 28 cases. 9 new cases in 4 days. 47% increa (Jul 14 : 06:53am)

Posted by Skyline Drive in NEWS
Big Bear City (Population 10,838)Confirmed cases: 10 (9.2 per 10,000 resid (Jul 14 : 06:21am)


(C)2002-2020 Socalmountains.com
All Rights Reserved
Privacy Policy Terms of Service
Contact Us

{THEMEDISCLAIMER}