Archive for the 'Cell Phones' Category


Google: Android security fix to roll out over next few days

Google on Wednesday began fixing a security flaw that affects some 97% of Android smartphones. The fix, which addresses a hole allowing hackers to access the contacts, calendars and photos on an Android phone connected to an open Wi-Fi network, will take a few days to cover every phone, a Google spokesman said.

Additionally, owners of Android smartphones are being warned to avoid public WiFi networks after researchers found a security flaw that could affect the vast majority of devices based on Google’s software.

Full Article Here.


iPhone keeps record of everywhere you go

Privacy fears raised as researchers reveal file on iPhone that stores location coordinates and timestamps of owner’s movements.

Security researchers have discovered that Apple’s iPhone keeps track of where you go – and saves every detail of it to a secret file on the device which is then copied to the owner’s computer when the two are synchronised.

The file contains the latitude and longitude of the phone’s recorded coordinates along with a timestamp, meaning that anyone who stole the phone or the computer could discover details about the owner’s movements using a simple program.

For some phones, there could be almost a year’s worth of data stored, as the recording of data seems to have started with Apple’s iOS 4 update to the phone’s operating system, released in June 2010.

Full Article Here

Questions about iPhone Tracker


Apple patents ‘anti-sexting’ technology

Apple has patented technology that could be used by parents to prevent their kids from sending sexually explicit text messages — or “sexting.”

The technology, which has not been commercialized, would let a phone’s administrator block an iPhone from sending or receiving texts with certain words.

Messages containing blocked material either would not be received or would have the objectionable content redacted. Unlike other text blockers, Apple’s version would also be able to filter content based on a child’s grade level and claims to filter abbreviated words that maybe missed by other programs.

Read Full Article Here


Web Photos That Reveal Secrets, Like Where You Live

When Adam Savage, host of the popular science program “MythBusters,” posted a picture on Twitter of his automobile parked in front of his house, he let his fans know much more than that he drove a Toyota Land Cruiser.

Embedded in the image was a geotag, a bit of data providing the longitude and latitude of where the photo was taken. Hence, he revealed exactly where he lived. And since the accompanying text was “Now it’s off to work,” potential thieves knew he would not be at home.

Security experts and privacy advocates have recently begun warning about the potential dangers of geotags, which are embedded in photos and videos taken with GPS-equipped smartphones and digital cameras. Because the location data is not visible to the casual viewer, the concern is that many people may not realize it is there; and they could be compromising their privacy, if not their safety, when they post geotagged media online.
Full Article


Cell Phone Spying Nightmare: ‘You’re Never the Same’

People can learn all about your private life through your cell phone, and one woman said she was stalked for three years because of it. Susan, who asked that her real name be kept private because of worry over her safety, said her ex-boyfriend tormented her using only her cell phone to do it.

Most people know that the GPS in a cell phone can track your every move, but that’s just the beginning. Widely available software that can be installed on almost any cell phone can track not just your whereabouts but also your private conversations and personal information.

Full Article with Video


AT&T Cell Phones Breach Internet Security, not just with Facebook

A Georgia mother and her two daughters logged onto Facebook from mobile phones last weekend and wound up in a startling place: strangers’ accounts with full access to troves of private information.

The glitch — the result of a routing problem at the family’s wireless carrier, AT&T — revealed a little known security flaw with far reaching implications for everyone on the Internet, not just Facebook users.

In each case, the Internet lost track of who was who, putting the women into the wrong accounts. It doesn’t appear the users could have done anything to stop it. The problem adds a dimension to researchers’ warnings that there are many ways online information — from mundane data to dark secrets — can go awry.

Several security experts said they had not heard of a case like this, in which the wrong person was shown a Web page whose user name and password had been entered by someone else. It’s not clear whether such episodes are rare or simply not reported. But experts said such flaws could occur on e-mail services, for instance, and that something similar could happen on a PC, not just a phone.

“The fact that it did happen is proof that it could potentially happen again and with something a lot more important than Facebook,” said Nathan Hamiel, founder of the Hexagon Security Group, a research organization.

Full Story Here via ABC News


FAQ: Using your smartphone safely

Smartphones aren’t just smart, they’re personal computers. Unlike a desktop or even a laptop PC, those devices and other mobile phones can easily slip out of a pocket or purse, be left in a taxi, or get snatched off a table.

They let you store photos, access e-mails, receive text messages, and put you one browser click away from potentially malicious Web sites.

In effect, gadgets like the Apple iPhone and those running Google’s Android software can be as risky to use as PCs, except that the wide variety of mobile platforms has deprived malicious hackers of one dominant software element to target, such as they have with Microsoft’s Windows operating system on desktops and laptops.

Look at the different types of threats that affect smartphone users and what people can do to protect themselves.

Losing your mobile phone is the biggest security threat to your smartphone. Mobile device users should also be careful about leaving the phone unattended, or loaning it to people. Spyware can be installed without you knowing it. For instance, the PhoneSnoop program can be used with BlackBerry devices to remotely turn the microphone on to eavesdrop on nearby conversations.

They can get viruses – Mobile viruses, worms and Trojans have been around for years. They typically arrive via e-mail but can also spread via SMS and other means

Smartphone users are vulnerable to e-mail and Web-based attacks like phishing and other social-engineering efforts. All attackers have to do is create a malicious Web page and lure someone to visit the site where malware can then be downloaded onto the mobile device.

Recognizing phising emails. Researchers also showed how an attacker could spoof an SMS to make it look like it comes from the carrier to get the target to either download malware or visit a site hosting it.

Safe to use Wi-Fi and Bluetooth? Yes and no. If you are doing something sensitive on your phone, like checking a bank account or making a payment, don’t use the free Wi-Fi at a coffee shop or other access point. Use your password-protected Wi-Fi at home or the cellular network to avoid what is called as a man-in-the-middle attack in which traffic is intercepted. Pairing a mobile phone with another Bluetooth-enabled device, like a headset, means any device that can “discover” another Bluetooth device can send unsolicited messages or do things that could lead to extra fees, data being compromised or corrupted, data stolen in an attack called “bluesnarfing,” or the device being infected with a virus.

“Regardless of what type of cell phone, the most dangerous current threat is through a cellphone’s in/out message boxes,” he said. “Clear (them) out regularly. Do not transmit full account numbers, PIN or passwords within a text message unless you immediately delete the out box message.”

Full Article via CNN

Twitter Button from

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 7 other followers