All posts in Hacker

A Mobile botnet is described as a type of botnet that targets mobile devices, attempting to gain complete control of the device and its contents as well as providing control to the botnet originator. Based on research done by several top computer software security companies, mobile phone botnets are on the rise. Read more
Most people are unaware of how easily someone can hack into their cell phone. There are devices that allow someone (hacker) to hack into your cell phone by just dialing the number. With this technology, they can also listen to your calls, read your emails and texts, listen to the phone’s surroundings such as conversations going on in the room, gain access to your photos and your social media information or any other information stored on your phone. They can even retrieve your password to your online bank account. Read more
(Definition: (Radio Frequency IDentification) A data collection technology that uses electronic tags for storing data. The tag, also known as an "electronic label," "transponder" or "code plate," is made up of an RFID chip attached to an antenna. Transmitting in the kilohertz, megahertz and gigahertz ranges, tags may be battery-powered or derive their power from the RF waves coming from the reader.Like bar codes, RFID tags identify items. However, unlike bar codes, which must be in close proximity and line of sight to the scanner for reading, RFID tags do not require line of sight and can be embedded within packages. Depending on the type of tag and application, they can be read at a varying range of distances.) Read more

Hacking PEDs Is Child’s Play

Categories: Hacker, Hacking
Comments Off on Hacking PEDs Is Child’s Play

Are PEDs (personal electronic devices)  Safe from Hacking

If you think that PEDs (personal electronic devices) are safe while left unattended in a typical locker box during a secure meeting or SCIF read on……

Would you believe that a middle school child could be writing malware (software such as viruses or Trojans designed to cause damage or disruption to a computer system)? We know that kids are very curious and studies have pointed to kids of all ages becoming technically savvy at ages earlier than we expected; but would writing malware ever cross our minds?

It could start out as easy as kids trying to impress their peers by writing spyware and showing their friends that they can hack into their video game logins. This may seem insignificant at first, but some gaming accounts have credit card details allowing users to make gaming purchases. This shows how vulnerable our financial information can be.

Researchers have said, “You teach your children that you can’t take a toy without paying – so we think this type of a message needs to get to the kids when they’re writing software too.”

Compromise our “Mobility Data”

The technology that makes our life so easy allows others to compromise our “mobility data”.  There is a real need to protect our information since it is so simple for even a child to appropriate. Think about the level of protection that you need to protect your trusted information and the countermeasures that need to be put in place to protect that very information.