Is Someone Watching You From The Camera On Your Phone?

Do you ever feel like you’re being watched? Perhaps your phone could be the culprit?

It’s common knowledge that computers are often infected with malware, but did you know your phone is at risk as well?

Kevin Mitnick did an interview with Business Insider and revealed some of the ways your phone could be accessed without your knowledge.

There are two common ways someone could use your phone to spy on you. If an individual has access to your phone and has your passcode, they can use software called Flexispy to read your texts, even text messages you had previously deleted. Additionally, they can also listen in to your phone conversations, find out where you are, and watch you from the camera on your phone.

Another way your phone could be hacked is by someone accessing your phone from a remote location. This is often accomplished by a professional hacker or by law enforcement.

It’s not as easy for someone to hack into your phone from afar, but it can be done.

Technology is available that allows the hacker to take over your phone and turn on your phone’s camera, but if they are trying to hack into and iPhone, the software will set them back a cool $1.5 million. With that being said, it’s far cheaper to hack into an Android device, with the average cost being around $200K.

So what can you do to protect your privacy? Make sure you are running the latest version of iOS and if you are worried your phone may be compromised, restore your phone to the factory settings.

Read this cool post and more like them at the source.

Source: Kiss 95.1 FM

Topics: Speaking Engagements, spying, phone hacking, factory settings, Flexispy, iPhone, passcode, reset phone, law enforcement surveillance, malware, cyber attack, phone camera, iOS, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

The Growth of Third-Party Software Supply Chain Cyber Attacks

When testing your employees' social engineering readiness, your teams need simulated attacks that feel as if they’re coming from a nefarious engineer...

Read more ›

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›
tech-texture-bg