Secure Mobile Phone

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 24 July 2013

Android Phones - The New Corporate Espionage Tool

Posted on 08:43 by Unknown
Alcatel-Lucent’s Kindsight subsidiary has released figures that show an increase in malicious software (malware) used by hackers to gain access to devices for corporate espionage, spying on individuals, theft of personal information, generating spam, denial of service attacks on business and governments and millions of dollars in fraudulent banking and advertising scams.

“Malware and cybersecurity threats continue to be a growing problem for home networks and mobile devices, particularly for Android smartphones and tablets which are increasingly targeted,” said Kevin McNamee, security architect and director of Alcatel-Lucent’s Kindsight Security Labs.

“A third of the top 15 security threats are now spyware related, up from only two spyware instances the last quarter,” said McNamee. “MobileSpy and FlexiSpy were already in the top 15 list, but SpyBubble moved up to take the 4th spot, while SpyMob and PhoneRecon appeared for the first time, ranking 5th and 7th respectively.

“Mobile spyware in the BYOD context poses a threat to enterprises because it can be installed surreptitiously on an employee’s phone and used for industrial or corporate espionage.”

McNamee said it is “surprisingly easy” to add a command and control interface to allow the attacker to control the device remotely, activating the phone’s camera and microphone without the user’s knowledge.

“This enables the attacker to monitor and record business meetings from a remote location. The attacker can even send text messages, make calls or retrieve and modify information stored on the device – all without the user’s knowledge.

“The mobile phone is a fully functional network device. When connected to the company’s Wi-Fi, the infected phone provides backdoor access to the network and the ability to probe for vulnerabilities and assets. (more)

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in cautionary tale, cell phone, espionage, malware, spyware, statistics, survey | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • The Ratters - men who spy on women through their webcams
    The woman is visible from thousands of miles away on a hacker's computer.   The hacker has infected her machine with a remote administr...
  • Google Glass Hacked - Everything You See and Hear Transmitted to Anyone
    Google's Glass wearable computer have been hacked so video and audio can be transmitted online to anyone. Hackers have been able to remo...
  • This Week in Spy News
    The chairman of Stow College in Glasgow has resigned after a row over a recorded conversation on a device branded a "spy-pen". ( m...
  • CONTEST (ENDED) - Who Is This Man?
    We have a winner! Congratulations!! Answer below. Clues... • Born 1897. • Died 1973. • Expert wiretapper.  • Good high speed driver.  • Shar...
  • The US classification system
    (Updated: October 12, 2013) Top Level Telecommunications often involve information that has to be kept secret. To ensure that, governments h...
  • When Paranoids Collide they Blow the Whistle on Tea Kettles
    Customs agents in Russia found tea kettles and irons bugged with tiny Spyware chips that exploit WiFi connections , reports a local news out...
  • "1984" Gets a New Look
    via creativity-online.com ... You can't judge a book by its cover, but there's no denying that a thoughtful, bold packaging can mak...
  • Watergate's Next Watergate
    A history professor hopes that a federal court's recent order to release long-sealed Watergate documents will shed light on the motivati...
  • Laser Beam Eavesdropping - In the News Again
    Since the 1970's, stories about laser listeners have periodically popped up in the news. The common thread is their magical ability to e...
  • Spybusters Tip # 723 - Be Smart - Use a Dumb Phone to Thwart Spyware
    Sometimes you just need a dumb phone that can't spy on you.   inKlien Global's tiny phone 6.5mm Ultra Thin AIEK M3 Cool Card Cell Ph...

Categories

  • advice
  • aerial
  • amateur
  • Android
  • App
  • Apple
  • art
  • biometric
  • BlackBerry
  • blackmail
  • Bluetooth
  • Boeing
  • book
  • business
  • BYOD
  • CALEA
  • cartoon
  • cautionary tale
  • CCTV
  • cell phone
  • CIA
  • Classification
  • Clothing
  • computer
  • contest
  • counterespionage
  • Darwin
  • data
  • detection
  • drone
  • dumb
  • eavesdropping
  • email
  • employee
  • encryption
  • ERII
  • espionage
  • extortionography
  • FBI
  • fiber-optic
  • find
  • food
  • FREE
  • fun
  • FutureWatch
  • General Dynamics
  • Germany
  • Gold Phone
  • government
  • GPS
  • GSM
  • Hack
  • historical
  • Hotline
  • humor
  • IAPSC
  • IMCPB
  • Infrared
  • Internet
  • ISAF
  • Israel
  • IST
  • IT
  • just coincidence?
  • KDM
  • keystroke
  • KGB
  • Kremlin
  • laser
  • law
  • lawsuit
  • leaks
  • malware
  • marketing
  • MI6
  • mind reading
  • miscellaneous
  • mores
  • movie
  • nature
  • Netherlands
  • North Korea
  • NSA
  • Obama
  • optics
  • OSS
  • password
  • PI
  • police
  • political
  • poll
  • POTUS
  • PRISM
  • privacy
  • product
  • quiz
  • quote
  • Ra-parents
  • Ray-Gun
  • recording
  • Red Phone
  • religion
  • RFID
  • Russia
  • sabotage
  • satire
  • scam
  • shredder
  • Situation Room
  • social engineering
  • software
  • sports
  • Spy Museum
  • spy school
  • spybot
  • spycam
  • spyware
  • SpyWarn
  • statistics
  • STE
  • steganography
  • STU-II
  • STU-III
  • surveillance
  • survey
  • telephone
  • TEMPEST
  • Tips
  • toy
  • tracking
  • trade secret
  • TSCM
  • Twitter
  • UMTS
  • USA
  • USB
  • USSR
  • Vatican
  • VoIP
  • voyeurism
  • Watergate
  • weird
  • White House
  • Wi-Fi
  • Wireless
  • wiretapping
  • X-Ray Vision

Blog Archive

  • ▼  2013 (455)
    • ►  November (47)
    • ►  October (53)
    • ►  September (31)
    • ►  August (50)
    • ▼  July (50)
      • Russian Metro to Track Lost / Stolen Phones
      • World's Biggest Data Breaches - Infographic
      • And, the winner of Who's Got the Biggest Electroni...
      • Israel's Verint to Get Indian Government Contract ...
      • Surveillance Camera Hack to be Reveled at Black Hat
      • ISPs Grossed as Feds Net Passwords
      • Wiretap Evidence Included in SAC Capital Case
      • NSA says there are three different PRISMs
      • Double-Edged Sword Zone - Protect Your Office with...
      • Did You Know... Surprising Spy Facts!
      • Happy Birthday, CIA
      • Hot Stock Tip...
      • The Other Domestic Spying Scandal
      • Business Secrets Leak via Personal Devices
      • Android Phones - The New Corporate Espionage Tool
      • SIM Card Flaw Could Allow Eavesdropping on Phone C...
      • You’ve Nicked Hackers... Now Expose the Buggers
      • The Wild Wild West - Town to Issue Drone Hunting P...
      • Bug Found in Office of Berlusconi's Judge
      • If You Can Pee, You Can Make a Phone Call
      • Mobile Security Apps Perform Dismally Against Spyware
      • Android Malware that Gives Hackers Remote Control ...
      • New Jersey Supreme Court Restricts Police Searches...
      • If You Think The NSA Is Bad, Wait To You See South...
      • NSA Leak Highlights the Power of Spying - Irish Ey...
      • New slides about NSA collection programs
      • Bremont Codebreaker Crypto Watch Turns Position of...
      • Keeping the NSA in Perspective
      • Hackers Turn Verizon Box into Spy Tool
      • Attack of the Cyber Mercenaries
      • Watergate Redux
      • Free Webinar - Corporate Espionage via Mobile Device
      • New insights into the PRISM program
      • How Eavesdropping Was Punished in Medieval Times
      • "That ain't my phone." (Extra penalty point.)
      • Living in La La Land - Where Nobody Spies
      • TSCM Bug Sweep Cost Question & Infrared Instrument...
      • Security Alert: 'Master key' to Android Phones Unc...
      • Surveillance Humor
      • Secret Recording of Rupert Murdoch's Staff Meeting...
      • How to Use Public Wi-Fi More Securely
      • Major Privacy Breach Discovered on Motorola Phones
      • Espionage is No Secret
      • The Surveillance Group Ltd Denies Bugging the Ecua...
      • Hidden Microphone Found at Embassy Where Julian As...
      • Does using encryption make you a bigger target?
      • U.S. Looks to Blunt Corporate Espionage
      • European Commission Conducts Bug Sweeps
      • Wi-Vi Sees Movement Behind Walls Using Cheap Wi-Fi...
      • What does espionage look like in the 21st century?
    • ►  June (47)
    • ►  May (35)
    • ►  April (40)
    • ►  March (29)
    • ►  February (33)
    • ►  January (40)
  • ►  2012 (84)
    • ►  December (33)
    • ►  November (33)
    • ►  October (12)
    • ►  June (2)
    • ►  May (2)
    • ►  February (1)
    • ►  January (1)
Powered by Blogger.

About Me

Unknown
View my complete profile