Category Archives: Smart Phone Hacking

Snowden Movie Brings Issue of Personal Privacy to the Forefront

Michael Gregg appeared Friday, September 16th on The Fox Morning Show in Houston to talk about the risks to personal privacy that are now occurring because of technology and how these threats will become more advanced and widespread for the … Continue reading

Posted in Cyber security, Ethical Hacking, Hacking, Ransomware, Smart Phone Hacking | Tagged , , , , , | Leave a comment

Did “Russian speaking operatives” create the Red October malware to invade specific organizations’ computers, networks and smartphones?

Last October, a world-name in IT anit-virus security and research, Kaspersky, revealed the workings of five-year old malware program hitting on networks throughout “diplomatic, governmental and scientific research organizations,” according to a post on SecureList.org, “The Red October Campaign…An Advanced … Continue reading

Posted in Cyber security, Hacking, Smart Phone Hacking | Tagged , , , , , , | Leave a comment

Is Bringing Your Device to Work a Good Idea?

Personal laptops, smart-phones, and tablets are becoming quite common in corporate America, making for headaches for IT departments who have to contend with new issues that would have been unheard of before. Here are some issues that must be addressed as companies examine developing a Bring Your Own Device policy. Continue reading

Posted in Cyber security, IT and Computer Security, Smart Phone Hacking, Uncategorized | Tagged , , , | Leave a comment

To Prevent Cyber Hacks Should the U.S. adopt a “No Made-in-China” Policy for Chinese Made Telecom Equipment

Earlier this year, Information Age reported that Cambridge University researchers discovered that a microprocessor used by the U.S. military (made in China) contains secret remote access capability (a “backdoor”) which means that it can be reprogrammed or shutdown without the … Continue reading

Posted in Ethical Hacking, Hacking, IT and Computer Security, Smart Phone Hacking | Tagged , , , , , , , | Leave a comment

The Threat of Apple Malware – Does Your Mac Need Protection?

For many years Apple users have not worried about malware to the extent Microsoft Windows users have.  Has the immunity to malware finally come to an end? Some might say yes, while others disagree. Apple computers no longer hold the … Continue reading

Posted in Hacking, Smart Phone Hacking, Training and Education | Tagged , , , , , , , , , | Leave a comment

Where Did You Leave Your Smart Phone?

Did you know that over 5.6 billion people own/use at least one cell phone? In the United States alone, over 91% of the population owns and/or uses a cell phone. Thankfully, many cell phones now have the technology to protect and to find your lost cell phone. Continue reading

Posted in IT and Computer Security, Smart Phone Hacking, Uncategorized | Tagged , , , , | Comments Off on Where Did You Leave Your Smart Phone?

War Texting with your Smartphone to Hack Cars

While it may seem far fetched to some, security researchers at Black Hat recently demonstrated how cars can be hacked via war texting.  Most remote control automotive systems use a cellular connection embedded in cars to provide these services.  The … Continue reading

Posted in Ethical Hacking, Hacking, Smart Phone Hacking | Tagged , , , , , , | Leave a comment

Smart Phone Malware Continues To Spread

While Android users may have previously felt secure, attacks against these devices continue to grow.  A new Android Trojan known as Geinimi  is quickly spreading in China. Security researchers have reverse engineered the malicious code and discovered that Geinimi has … Continue reading

Posted in Hacking, IT and Computer Security, Smart Phone Hacking | Tagged , , , , , , | Leave a comment

MagicJack Hacking

MagicJack is a great device for those traveling abroad or anyone needing an occasional extra phone.  The only real problem is when you happen to forget the MagicJack adapter or in situations when it’s just not possible to plug in … Continue reading

Posted in Ethical Hacking, Smart Phone Hacking | Tagged , , , | Leave a comment

Blackberry May Allow Some Monitoring by Government Entities

It looks like Saudi Arabia has succeeded in forcing RIM to allow access to a portion of its data as it flows through the cell phone network.  The proposed deal with Saudi Arabia should seem like a real victory to … Continue reading

Posted in Smart Phone Hacking | Tagged , , , , | Leave a comment