WATCH: Hackers and state authorities you can follow through a camera cell phone

How easy it is to hack into a cell phone and secretly turn on a camera

(Translated from Croatian using Google Translator

People know that computers can have malware, but not everyone is aware that cell phones are vulnerable. Kevin Mitnick , a hacker and author of the book "The Art of Invisibility", explains two simple ways you can hack into a cell phone, according to Business Insider .

"How easy is it to hack someone else's cell phone and secretly switch the camera on him and spy on everything the other person is doing? There are two simple ways. If someone has physical access to the phone, such as iPhone and knows the code, then the matter is quite simple.

There is software that can be purchased on the Internet for a few hundred dollars. One of them is called Through it you can turn on the camera of someone else's cell phone, can read all messages, even those that have been deleted, can eavesdrop on calls. Also, one can see the exact location of the person. Something like having a GPS attached to yourself. But to make it all happen, the person who has bad intentions must be near you. Such things usually work for spouses or partners when they suspect fraud, "said Mitnick.

Two ways of hacking

Mitnick adds that another way of hacking the remote control. "And, they do -  law enforcement, FBI, State, NSA ... They actually take advantage of the weaknesses that are found in cell phone software. If national authorities decide to compromise someone, they will make it very simple, that you will not even know. There is no way that people discover that they have malware on their mobile phones.

But one of the things people can do to protect their privacy, for instance, always get the latest version of iOS that Apple has out and have a strong password on the mobile phone for which no one else knows. If you ever suspect that your phone is infected with malware, what you can do is reload the firmware, which means you will get your iPhone back to factory settings. Well, if it was infected with malware, after this it's gone, "explained Mitnick.

Watch this cool video and see other interesting posts at the source.

Source: Telegram

Topics: SMS messages, Speaking Engagements, The Art of Invisibility, vulnerabilities in software, eavesdropping, cell phone hacking, factory settings, Flexispy, intercept calls, invasion of privacy, iPhone, iPhone camera, physical access to phone, malware, Android phones, Apple, remote control hacking, iOS, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›

Understanding Post-Inoculation Cybersecurity Attack Vectors

If you’ve recently improved your cybersecurity posture, you should know that the work to protect your company’s data is not over.

Read more ›