So, there has been a lot of chatter in the news lately about how someone can take over your cell phone without you even knowing. They can listen in on your calls, read your text messages, and even use your phone's gps to locate you. They can also turn on your phone's microphone and listen in on a conversation you are having face to face with someone. This can all be done without you ever realizing it. Here are some tips on how to avoid becoming a victim.
Here is how they work..
This is software someone downloads directly into the phone, using the phones web browser and Internet connection. The software then captures all the options the user selects (SMS, Call Logs, Email, call monitoring, microphone activation, GPS location) and uses the phones Internet connection to send it to their private web account where they can view it from any computer or cell phone. It will also send them the text messages direct and allow them to listen to all your phone traffic in real time…
To gain access to the phone the software is either loaded via Bluetooth or an Internet Connection.
With the Bluetooth option the spy can load the software from any location close enough to the phone to connect. (up to 60 feet) To prevent the Bluetooth loading you must either turn off Bluetooth or disable the “Allow Bluetooth device to discover this connection”
To load from the web they must have physical access to your phone. It is strongly recommended that you password protect you phone so it locks when you do not use it for a certain period…
Keep in mind this type of program also works on laptops. (anything with Bluetooth and Internet connections) You may want to turn off the Bluetooth feature on your laptop if you are not using it…
How do I know if my phone is bugged?
One of the few ways to check and see if your phone is infected is to check and see if the phone is set up for an “Internet Access Point” and seeing if the location of the point is something other than your Phone company. Anything like flexspy, phonespy, or any other name you do not recognize may indicate your phone is bugged. (Check with you phone provider before you delete or change this) This is not foolproof but is one of the few ways for the user to locate the software. Some of the programs even block the ability of you to see this information.
Other things to look for to determine if your phone is infected include
Tuesday, April 28, 2009
Cell Phone Hackers
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment