Share this post

user icon

Live

People Reading

This story now

These White Hat Hackers Tell You Everything About Hacking Any Phone

Every day new threats emerge, and the white hats are busy trying to devise ways for us to be immune to those threats. While technology makes our life easy, it poses new challenges to our security, both on and off the web. That small device which sits in our hands for the most of our day is powerful and yet very sensitive to these threats.

These white hat hackers tell us the multiple ways in which we can protect ourselves from the attackers.

These White Hat Hackers Tell You Everything About Hacking Any Phone

These White Hat Hackers Tell You Everything About Hacking Any Phone

754 396
  in Science & Technology

Phreaked out by Motherboard.

Phreaked out by Motherboard.

In the recent episode of Phreaked out by Motherboard, the white hats made us look closely as to how our security could be compromised through our mobile phone.

The open WiFi attack.

The open WiFi attack.

The person here explains about how an open WiFi setting in the phone can be exploited to get into the phone.

Here's how:

Here's how:

If a remembered network could be recreated by an attacker, for which he just needs to know the name of the network, then you phone would automatically connect to it.

The traffic has been redirected.

The traffic has been redirected.

When this happens, all the traffic, that is, requests from your phone, would pass through the attackers device. Thereby, he can monitor it, or even modify it.

Demontration of attack through drones.

Demontration of attack through drones.

Drones were used to create WiFi networks and thereby, to collect information on all the mobile phones connected to it. The drones would collect all the data and send it to some central device.

Locations can be tracked.

Locations can be tracked.

The device shouts out every kind of information, as to where you live, what you are accessing, which image you are looking at, and so on. The snoopy software is used to achieve this.

Check out this video to know this havoc wrecking thing.

Share this with your geek friends and post your thoughts in the comment section below.

Loved this? Spread it out then

comments Comment ()

Post as @guest useror
clear

clear
arrow_back

redo Pooja query_builder {{childComment.timeAgo}}

clear

clear
arrow_back

Be the first to comment on this story.

Report

close

Select you are Reporting

expand_more
  • +2351 Active user
Post as @guest useror

NSFW Content Ahead

To access this content, confirm your age by signing up.