Little-known ways hackers take over your phone, data and money - News and Current Events | futures trading

Go Back

> Futures Trading, News, Charts and Platforms > Traders Hideout > News and Current Events

Little-known ways hackers take over your phone, data and money
Started:August 22nd, 2014 (08:06 PM) by kbit Views / Replies:132 / 0
Last Reply:August 22nd, 2014 (08:06 PM) Attachments:0

Welcome to

Welcome, Guest!

This forum was established to help traders (especially futures traders) by openly sharing indicators, strategies, methods, trading journals and discussing the psychology of trading.

We are fundamentally different than most other trading forums:
  • We work extremely hard to keep things positive on our forums.
  • We do not tolerate rude behavior, trolling, or vendor advertising in posts.
  • We firmly believe in openness and encourage sharing. The holy grail is within you, it is not something tangible you can download.
  • We expect our members to participate and become a part of the community. Help yourself by helping others.

You'll need to register in order to view the content of the threads and start contributing to our community. It's free and simple, and we will never resell your private information.

-- Big Mike

Thread Tools Search this Thread

Little-known ways hackers take over your phone, data and money

Old August 22nd, 2014, 08:06 PM   #1 (permalink)
Elite Member
Aurora, Il USA
Futures Experience: Advanced
Platform: TradeStation
Favorite Futures: futures
kbit's Avatar
Posts: 5,839 since Nov 2010
Thanks: 3,275 given, 3,321 received

Little-known ways hackers take over your phone, data and money

With hacking attacks and other cyber crime making the news almost on a daily basis, it’s time we realize that no place is safe. And if you think only computer users should be worried, you are in for an unpleasant surprise.

Even with Kaspersky Labs reporting an incredible 20-fold explosion in the theft of financial details from mobile devices, not many people realize just how open and vulnerable to hacking their cell phones are. Although there are many other ways hackers can hijack or spy on your device, in today’s article I’ll focus on less-known strategies that cyber criminals employ to take over your smartphone, your data and your money.

PayWave … your money goodbye

If you’re a gamer like me (or if you watch Conan O’Brien), you’ve probably heard about wildly popular futuristic sandbox game Watchdogs, where (among other things) you can steal other people’s credit card data simply by targeting them via an app on your cell phone. Well, that’s not science fiction anymore. The app with a similar functionality, NFCProxy, was demonstrated at the Defcon hacker conference in Las Vegas in 2012. NFCProxy is capable of both reading and broadcasting data from contactless credit cards. (Cards at risk are branded with names like PayPass, Zip, payWave and ExpressPay by Visa, MasterCard, Discover and American Express.) The attacker just needs to brush against the victim, without ever touching her, and let the RFID reader do the rest. The stolen data can then be used to make a purchase, just like this.

As if that wasn’t troubling enough, apart from copying your credit card data, NFC (Near Field Communications Protocol) can also be used to take over your entire mobile device.

IPhone accelerometer keylogging

Georgia Tech computer scientists have found a way to make an Apple AAPL, +0.74% iPhone “eavesdrop” on your keyboard-based communications. To achieve that, they used iPhone’s accelerometer to detect minute vibrations caused by key presses. Using relative distance, their keylogger app was able to guess with 80% accuracy which keys were being pressed. Obviously, your iPhone needs to have their app installed for this to happen, and it needs to be near the keyboard. But wait until a newer app improves on that functionality.

Wi-Fi virus

Although this isn’t specifically a smartphone virus, it still affects mobile users. The interesting thing about this piece of malicious software is that it appears where it’s least expected: not on your device or on a web location. Instead, it infects your AP (access point), usually your home router. Once infected, the virus can do undesirable things, such as collect and transmit the credentials of other Wi-Fi users who connect to the infected AP.


After installing malware on your rooted or jailbroken mobile device, an attacker can access logs where you touched the screen. Using this data, the attacker can easily read your text messages, passwords and more, simply by looking for your on-screen keyboard presses.

Joining hacker’s Wi-Fi network

Our mobile phones are usually all too eager to automatically join previously accessed Wi-Fi networks. In this attack, a hacker forges the name of his Wi-Fi network into a familiar name, like “Starbucks” or “attwifi,” which tricks your phone into thinking it is a known network. After the victim’s phone automatically connects to the network, the attacker proceeds with the intrusion, modifying the content on the device, all without alerting the owner.

Bogus cell-phone tower hack

Security researcher Chris Paget has created a cell-phone base station that mimics more expensive devices already used by intelligence and law-enforcement agencies. It tricks cell phones into routing their outbound calls through his device, allowing someone to intercept calls.

The device tricks the phones into disabling encryption, and records call details and content before they’re routed on their proper way.

Little-known ways hackers take over your phone, data and money - MarketWatch

Reply With Quote
The following 3 users say Thank You to kbit for this post:

Reply > Futures Trading, News, Charts and Platforms > Traders Hideout > News and Current Events > Little-known ways hackers take over your phone, data and money

Thread Tools Search this Thread
Search this Thread:

Advanced Search

Upcoming Webinars and Events (4:30PM ET unless noted)

An Afternoon with FIO trader bobwest

Elite only

NinjaTrader 8: Programming Profitable Trading Edges w/Scott Hodson

Elite only

Anthony Drager: Executing on Intermarket Correlations & Order Flow, Part 2

Elite only

Adam Grimes: Five critically important keys to professional trading

Elite only

Machine Learning Concepts w/FIO member NJAMC

Elite only

MarketDelta Cloud Platform: Announcing new mobile features

Dec 1

NinjaTrader 8: Features and Enhancements

Dec 6

Similar Threads
Thread Thread Starter Forum Replies Last Post
Phone Sex kbit Jokes 3 June 15th, 2013 09:49 PM
Overseas phone calls NW27 Off-Topic 2 August 13th, 2012 06:29 AM
7 Ways the U.S. Government Wastes Money kbit News and Current Events 1 February 11th, 2012 10:03 PM
Which Smart Phone to Get? aligator Tech Support 13 December 31st, 2011 05:08 PM
Hackers Steal Personal Data of 70 Million PlayStation Users Quick Summary News and Current Events 0 April 26th, 2011 07:00 PM

All times are GMT -4. The time now is 04:40 PM.

Copyright © 2016 by All information is for educational use only and is not investment advice.
There is a substantial risk of loss in trading commodity futures, stocks, options and foreign exchange products. Past performance is not indicative of future results.
no new posts

Page generated 2016-10-23 in 0.09 seconds with 19 queries on phoenix via your IP