• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Bnpositive's Blog

  • Home
  • Blog
  • About Me
  • Contact Me
  • FREE Local SEO Audit
You are here: Home / Archives for hacking

hacking

10/22/2015 By Jason Bean Leave a Comment

Beware Siri: How Hackers Attack Smartphones

Apple iPhone 4s Siri

Until recently, your smartphone has been a private place. Your apps, personal information, and contacts, were all safely stored within a locked screen. However, hackers never sleep. There is always someone, somewhere, hard at work on the next big breakthrough. And now hackers have it.

In order to avoid becoming a hacker's next victim, you've got to be informed of the latest system vulnerabilities and keep your software updated. There are also companies on your side, who constantly guard against the malicious intent of hackers. Stay updated by checking their social networks for news.

Here's a recap of recent events, including a look at how hackers gain access to your phone.

Headphone Hack

While this may be less of a hack and more of a malicious trick, you'll never keep your headphones in your phone again. A French government agency discovered they could control phones with silent (to the human ear) radio waves that your iPhone's Siri, or your Android's Google Now, would identify as voice commands.

If you leave headphones plugged into your phone, hackers can use those headphones as an antenna, which makes your phone more easily hacked. With this technique the hacker can make your phone download malware, send phishing scams through email, Facebook, Twitter, and other social network sites, or even have your phone call theirs, turning your phone into a listening device.

There are some limitations of this hack, ones which you can take advantage of for your protection. The plugged in headphones mentioned above, only work with this hack if they have a built-in microphone. And if your phone doesn't have Siri or Google Now enabled from your lock screen, the hacker can't access the program he needs. Most phones require the user to press a microphone button on the screen before they speak, which enables the voice command options.

Other Hacks to Watch For

MSpy is a surveillance app that tracks all received and dialed calls. It collects all texts, photos, and emails, and also monitors web history. The drawback of this app is that the person who uses it must have access to your phone. If you keep a healthy password on your lock screen, you should be in the clear.

Have you noticed all of the free charge stations in airports, malls, and other tech stores? Well, be careful where you plug in your phone. A USB charge station is a direct line of access. Some free charge stations have been outfitted with malware that is downloaded by your phone as soon as you plug in. Experts estimate that your phone is compromised within one minute if you use a malicious plug.

Beware of free Wi-Fi. Though coffee shops like Starbucks offer free Wi-Fi, tread carefully. A hacker can set up another Wi-Fi hotspot of their own and title it something similar, for instance, “Starbucks 2.” Some people will probably connect, and as soon as they do their phones are open for attacks. The hacker can then load malware on their phones which attacks email and personal contacts, which in turn sends out phishing schemes for money and more personal information.

Filed Under: Technology Tagged With: hacking, iPhone, malware, security, Siri, updates

07/28/2013 By Jason Bean Leave a Comment

How to Identify Hacked Email Links

I don’t know how many times I get emails from family and friends that have received emails themselves where they clicked on a link and it took them somewhere they didn’t want to go, or they ended up getting some kind of malware or virus installed on their machine.

I receive emails like these myself, but I’ve just taken for granted I guess at my ability to quickly see hacked links and avoid them. Alghough

Hacked Email Link

In the link below, if you just take a few seconds to look at the link you’ll see that the first part is for a website you’ve probably never heard of, and thus should be distrustful. Then you’ll see the more familiar reference to the CNN News website. This part is included to get people to think it’s a legitimate link. The other think to be aware of is that most of the time, periods are not included in urls except for before the top-level-domain extension (.COM, .NET, .ORG, etc.) and right before the final file name (.htm, .html, .php, .asp, .aspx, .php, etc.)

Long story short, if you see a link that looks like this, DON’T CLICK IT! Just delete the email.

Filed Under: Technology Tagged With: email, hacking, links, malware, security, virus

Primary Sidebar

Recent Posts

Person Studying at Laptop

Why Studying Is The Best Thing You Can Do While Unemployed

Covid-19 increased unemployment in many countries. The United States suffered from business … [Read More...] about Why Studying Is The Best Thing You Can Do While Unemployed

Laptop Credit Card - Online Shopping

5 Smart Tips for Safe Online Shopping in 2021

Online shopping is fast becoming the new norm. Thanks to the freedom, convenience, and ease it … [Read More...] about 5 Smart Tips for Safe Online Shopping in 2021

Setting a Budget at Christmastime

There are two types of people in the world: Savers and spenders. At Christmas, it is much easier to … [Read More...] about Setting a Budget at Christmastime

RSS Positively Indy

  • Video Multimedia Salute to Veterans on Indianapolis Monument Circle
  • Money Tasks to Remember for the Summer

RSS Mission Notes | Faith & Culture

  • Review: “Take Back Your Life” Devotional from Levi Lusko
  • How to Live Stream Your Church Service or Sermon This Weekend

RSS Homeschool Daddy

  • Listening and Understanding on a Budget: Helping Teens Make Healthy Decisions
  • Tips and Resources for Being the Best Parent You Can Be

Premium WordPress Themes from InkThemes.com
The Bouqs - Premium Farm Direct Flowers

Footer

  • Clients
  • Archives
  • Advertising Disclosure
  • Domain For Sale
  • Comment Policy

Copyright © 2021 · Executive Pro On Genesis Framework · WordPress · Log in