Little-known ways hackers take over your phone, data and money - News and Current Events | futures io social day trading
futures io futures trading


Little-known ways hackers take over your phone, data and money
Updated: Views / Replies:177 / 0
Created: by kbit Attachments:0

Welcome to futures io.

(If you already have an account, login at the top of the page)

futures io is the largest futures trading community on the planet, with over 90,000 members. At futures io, our goal has always been and always will be to create a friendly, positive, forward-thinking community where members can openly share and discuss everything the world of trading has to offer. The community is one of the friendliest you will find on any subject, with members going out of their way to help others. Some of the primary differences between futures io and other trading sites revolve around the standards of our community. Those standards include a code of conduct for our members, as well as extremely high standards that govern which partners we do business with, and which products or services we recommend to our members.

At futures io, our focus is on quality education. No hype, gimmicks, or secret sauce. The truth is: trading is hard. To succeed, you need to surround yourself with the right support system, educational content, and trading mentors – all of which you can find on futures io, utilizing our social trading environment.

With futures io, you can find honest trading reviews on brokers, trading rooms, indicator packages, trading strategies, and much more. Our trading review process is highly moderated to ensure that only genuine users are allowed, so you don’t need to worry about fake reviews.

We are fundamentally different than most other trading sites:
  • We are here to help. Just let us know what you need.
  • We work extremely hard to keep things positive in our community.
  • We do not tolerate rude behavior, trolling, or vendors advertising in posts.
  • We firmly believe in and encourage sharing. The holy grail is within you, we can help you find it.
  • We expect our members to participate and become a part of the community. Help yourself by helping others.

You'll need to register in order to view the content of the threads and start contributing to our community.  It's free and simple.

-- Big Mike, Site Administrator

Reply
 
Thread Tools Search this Thread
 

Little-known ways hackers take over your phone, data and money

  #1 (permalink)
Elite Member
Aurora, Il USA
 
Futures Experience: Advanced
Platform: TradeStation
Favorite Futures: futures
 
kbit's Avatar
 
Posts: 5,872 since Nov 2010
Thanks: 3,301 given, 3,332 received

Little-known ways hackers take over your phone, data and money

With hacking attacks and other cyber crime making the news almost on a daily basis, it’s time we realize that no place is safe. And if you think only computer users should be worried, you are in for an unpleasant surprise.

Even with Kaspersky Labs reporting an incredible 20-fold explosion in the theft of financial details from mobile devices, not many people realize just how open and vulnerable to hacking their cell phones are. Although there are many other ways hackers can hijack or spy on your device, in today’s article I’ll focus on less-known strategies that cyber criminals employ to take over your smartphone, your data and your money.

PayWave … your money goodbye

If you’re a gamer like me (or if you watch Conan O’Brien), you’ve probably heard about wildly popular futuristic sandbox game Watchdogs, where (among other things) you can steal other people’s credit card data simply by targeting them via an app on your cell phone. Well, that’s not science fiction anymore. The app with a similar functionality, NFCProxy, was demonstrated at the Defcon hacker conference in Las Vegas in 2012. NFCProxy is capable of both reading and broadcasting data from contactless credit cards. (Cards at risk are branded with names like PayPass, Zip, payWave and ExpressPay by Visa, MasterCard, Discover and American Express.) The attacker just needs to brush against the victim, without ever touching her, and let the RFID reader do the rest. The stolen data can then be used to make a purchase, just like this.

As if that wasn’t troubling enough, apart from copying your credit card data, NFC (Near Field Communications Protocol) can also be used to take over your entire mobile device.

IPhone accelerometer keylogging

Georgia Tech computer scientists have found a way to make an Apple AAPL, +0.74% iPhone “eavesdrop” on your keyboard-based communications. To achieve that, they used iPhone’s accelerometer to detect minute vibrations caused by key presses. Using relative distance, their keylogger app was able to guess with 80% accuracy which keys were being pressed. Obviously, your iPhone needs to have their app installed for this to happen, and it needs to be near the keyboard. But wait until a newer app improves on that functionality.

Wi-Fi virus

Although this isn’t specifically a smartphone virus, it still affects mobile users. The interesting thing about this piece of malicious software is that it appears where it’s least expected: not on your device or on a web location. Instead, it infects your AP (access point), usually your home router. Once infected, the virus can do undesirable things, such as collect and transmit the credentials of other Wi-Fi users who connect to the infected AP.

Touchlogging

After installing malware on your rooted or jailbroken mobile device, an attacker can access logs where you touched the screen. Using this data, the attacker can easily read your text messages, passwords and more, simply by looking for your on-screen keyboard presses.

Joining hacker’s Wi-Fi network

Our mobile phones are usually all too eager to automatically join previously accessed Wi-Fi networks. In this attack, a hacker forges the name of his Wi-Fi network into a familiar name, like “Starbucks” or “attwifi,” which tricks your phone into thinking it is a known network. After the victim’s phone automatically connects to the network, the attacker proceeds with the intrusion, modifying the content on the device, all without alerting the owner.

Bogus cell-phone tower hack

Security researcher Chris Paget has created a cell-phone base station that mimics more expensive devices already used by intelligence and law-enforcement agencies. It tricks cell phones into routing their outbound calls through his device, allowing someone to intercept calls.

The device tricks the phones into disabling encryption, and records call details and content before they’re routed on their proper way.

Little-known ways hackers take over your phone, data and money - MarketWatch

Reply With Quote
The following 3 users say Thank You to kbit for this post:

Reply



futures io > > > > Little-known ways hackers take over your phone, data and money

Thread Tools Search this Thread
Search this Thread:

Advanced Search



Upcoming Webinars and Events (4:30PM ET unless noted)

Linda Bradford Raschke: Reading The Tape

Elite only

Adam Grimes: TBA

Elite only

NinjaTrader: TBA

January

Ran Aroussi: TBA

Elite only
     

Similar Threads
Thread Thread Starter Forum Replies Last Post
Phone Sex kbit Jokes 3 June 15th, 2013 10:49 PM
Overseas phone calls NW27 Off-Topic 2 August 13th, 2012 07:29 AM
7 Ways the U.S. Government Wastes Money kbit News and Current Events 1 February 11th, 2012 11:03 PM
Which Smart Phone to Get? aligator Tech Support 13 December 31st, 2011 06:08 PM
Hackers Steal Personal Data of 70 Million PlayStation Users Quick Summary News and Current Events 0 April 26th, 2011 08:00 PM


All times are GMT -4. The time now is 09:22 AM.

Copyright © 2017 by futures io, s.a., Av Ricardo J. Alfaro, Century Tower, Panama, +507 833-9432, info@futures.io
All information is for educational use only and is not investment advice.
There is a substantial risk of loss in trading commodity futures, stocks, options and foreign exchange products. Past performance is not indicative of future results.
no new posts
Page generated 2017-12-13 in 0.11 seconds with 19 queries on phoenix via your IP 54.82.56.95