RSS
-
Recent Posts
Recent Comments
Archives
- June 2017
- February 2017
- September 2016
- August 2016
- June 2016
- January 2016
- April 2015
- January 2015
- February 2014
- January 2014
- October 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- November 2011
- October 2011
- September 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- May 2010
- April 2010
Categories
Meta
Category Archives: Smart Phone Hacking
Snowden Movie Brings Issue of Personal Privacy to the Forefront
Michael Gregg appeared Friday, September 16th on The Fox Morning Show in Houston to talk about the risks to personal privacy that are now occurring because of technology and how these threats will become more advanced and widespread for the … Continue reading
Posted in Cyber security, Ethical Hacking, Hacking, Ransomware, Smart Phone Hacking
Tagged Cyber Crime, Hackers, identity theft, malware, online-security, ransomware
Leave a comment
Did “Russian speaking operatives” create the Red October malware to invade specific organizations’ computers, networks and smartphones?
Last October, a world-name in IT anit-virus security and research, Kaspersky, revealed the workings of five-year old malware program hitting on networks throughout “diplomatic, governmental and scientific research organizations,” according to a post on SecureList.org, “The Red October Campaign…An Advanced … Continue reading
Posted in Cyber security, Hacking, Smart Phone Hacking
Tagged Cloud Computing, Cyber Security, cyber security professionals, Hackers, iphone, Wireless, worm
Leave a comment
Is Bringing Your Device to Work a Good Idea?
Personal laptops, smart-phones, and tablets are becoming quite common in corporate America, making for headaches for IT departments who have to contend with new issues that would have been unheard of before. Here are some issues that must be addressed as companies examine developing a Bring Your Own Device policy. Continue reading
To Prevent Cyber Hacks Should the U.S. adopt a “No Made-in-China” Policy for Chinese Made Telecom Equipment
Earlier this year, Information Age reported that Cambridge University researchers discovered that a microprocessor used by the U.S. military (made in China) contains secret remote access capability (a “backdoor”) which means that it can be reprogrammed or shutdown without the … Continue reading
Posted in Ethical Hacking, Hacking, IT and Computer Security, Smart Phone Hacking
Tagged APT, China, Cyber Crime, Huawei, internet security, malware, threat, Trojan
Leave a comment
The Threat of Apple Malware – Does Your Mac Need Protection?
For many years Apple users have not worried about malware to the extent Microsoft Windows users have. Has the immunity to malware finally come to an end? Some might say yes, while others disagree. Apple computers no longer hold the … Continue reading
Posted in Hacking, Smart Phone Hacking, Training and Education
Tagged attack, Cell phone, Cyber Crime, Hackers, Hacking, iphone, malware, rogueware, Smartphone, Trojan
Leave a comment
Where Did You Leave Your Smart Phone?
Did you know that over 5.6 billion people own/use at least one cell phone? In the United States alone, over 91% of the population owns and/or uses a cell phone. Thankfully, many cell phones now have the technology to protect and to find your lost cell phone. Continue reading
Posted in IT and Computer Security, Smart Phone Hacking, Uncategorized
Tagged cell phone security, cell phone security tips, Cyber Security, Security+, smart phone
Comments Off on Where Did You Leave Your Smart Phone?
War Texting with your Smartphone to Hack Cars
While it may seem far fetched to some, security researchers at Black Hat recently demonstrated how cars can be hacked via war texting. Most remote control automotive systems use a cellular connection embedded in cars to provide these services. The … Continue reading
Posted in Ethical Hacking, Hacking, Smart Phone Hacking
Tagged Cell phone, Cyber Security, Hackers, Hacking, iphone, threat, Wireless
Leave a comment
Smart Phone Malware Continues To Spread
While Android users may have previously felt secure, attacks against these devices continue to grow. A new Android Trojan known as Geinimi is quickly spreading in China. Security researchers have reverse engineered the malicious code and discovered that Geinimi has … Continue reading
Posted in Hacking, IT and Computer Security, Smart Phone Hacking
Tagged Cell phone, Hacking, malware, Smartphone, threat, Trojan, Wireless
Leave a comment
MagicJack Hacking
MagicJack is a great device for those traveling abroad or anyone needing an occasional extra phone. The only real problem is when you happen to forget the MagicJack adapter or in situations when it’s just not possible to plug in … Continue reading
Posted in Ethical Hacking, Smart Phone Hacking
Tagged Hacking, MagicJack, VoIP, Wireshark
Leave a comment
Blackberry May Allow Some Monitoring by Government Entities
It looks like Saudi Arabia has succeeded in forcing RIM to allow access to a portion of its data as it flows through the cell phone network. The proposed deal with Saudi Arabia should seem like a real victory to … Continue reading