E very day new threats emerge, and the white hats are busy trying to devise ways for us to be immune to those threats. While technology makes our life easy, it poses new challenges to our security, both on and off the web. That small device which sits in our hands for the most of our day is powerful and yet very sensitive to these threats.These white hat hackers tell us the multiple ways in which we can protect ourselves from the attackers.
In the recent episode of Phreaked out by Motherboard, the white hats made us look closely as to how our security could be compromised through our mobile phone.
The person here explains about how an open WiFi setting in the phone can be exploited to get into the phone.
If a remembered network could be recreated by an attacker, for which he just needs to know the name of the network, then you phone would automatically connect to it.
When this happens, all the traffic, that is, requests from your phone, would pass through the attackers device. Thereby, he can monitor it, or even modify it.
Drones were used to create WiFi networks and thereby, to collect information on all the mobile phones connected to it. The drones would collect all the data and send it to some central device.
The device shouts out every kind of information, as to where you live, what you are accessing, which image you are looking at, and so on. The snoopy software is used to achieve this.
Share this with your geek friends and post your thoughts in the comment section below.