celebrex max daily dose

Scarlett Johansson cellphone pictures aren’t all that smart phone hackers seek

Cellphone hacking has had more than its 15 minutes of fame recently, from the London reporting scandal that shook Rupert Murdoch’s media empire to the recent complaints from Hollywood celebrities Scarlett Johansson and Mila Kunis that private photos were stolen from their mobile hand-helds.

But these are not just isolated headlines, says former hacker Kevin Mahaffey, now chief technology officer for Lookout Mobile Security. The trend is accelerating quickly, he says.

“Just from January to June, the likelihood of a mobile malware attack has gone up 2-1/2 times,” he says, citing a recently released study by his firm. Computing is moving from desktops to mobile devices, he says, and as it does, so will serious hacking activity.

Hacker Kevin Mitnick is eager to show how easily anyone can be hit.

“Give me your cellphone number,” he says in an interview. Within seconds he has sent a spoof text message to my co-worker’s cellphone, as if it were coming from my number.

It appears I am telling her, “Please go to this site, ASAP – stackoverflow.com.”

This is a classic ruse, Mr. Mitnick says, pointing out that a malicious hacker would have inserted a booby-trapped website that could then mine passwords and other personal information from my friend.

“Because she trusts you, she probably would click on the link without worrying that it might be fake,” says Mitnick, a once-notorious hacker who spent five years in federal prison for his crimes. He now travels the globe teaching Fortune 500 companies how to keep their information safe.

This illustration underlines a sobering reality in an increasingly mobile, social media-driven daily life, say Mitnick and fellow security and technology experts: As more and more corporate and personal business is done via mobile devices and social media, consciousness about security in the new environment is not keeping pace.

Technology moves faster than we do, says Harry Sverdlove, chief technology officer for Bit9, an Internet security firm based in Waltham, Mass. “Technology itself progresses at the speed of electronics,” but the way society uses new tools and understands the pitfalls of them tends to progress at a much more human pace, he adds.

In the rush to embrace new technologies, “we shed precautions learned with previous technology like so many old clothes,” he says. A survey earlier this year by Trusteer, a financial services security firm, revealed that people were three times more likely to click on an unfamiliar link sent to their cellphone than one received on their desktop computer.

“People have very different attitudes about their cellphones than they do about their computers,” says Ben Knieff, director of fraud management technology at NICE Actimize, which specializes in security services. Mobile phones have a very personal, private feel to them, he adds.

“It’s psychologically very different from the computer they know,” says Joseph Steinberg, chief executive officer of Green Armor Solutions, a security software company, “because phones are in your pocket and feel very intimate.” But what many users fail to realize is that today’s sophisticated smart phone technology has converted these pocket devices into complex computing and Internet communications machines with a secondary phone functionality.

“Folks still don’t realize that their smart phone is really a small computer,” says Jack Walsh, program manager for International Computer Security Association Labs, which certifies security applications. “Mobile phones today have more computing power than all of NASA in 1969,” he says via e-mail.

And, he points out, even the battle to engage average computer users with basic security safeguards such as hard-to-guess passwords and robust antivirus software is far from won. “Heck,” he adds, “folks are still having trouble understanding that they have to use caution when using their desktops and laptops! So, it will be a while before they realize their phone has to be used with caution.”

But while consumers and even corporations have been slow to take mobile and social media threats seriously, hacking has become serious business, says David Koretz, CEO of Mykonos Software.

Article source: http://www.alaskadispatch.com/article/scarlett-johansson-cellphone-pictures-arent-all-smart-phone-hackers-seek

Posted in Mobile Security Tagged with: , , , , , , , , ,

Leave a Reply

Your email address will not be published. Required fields are marked *


You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>