Comments
Android Security: 8 Signs Hackers Own Your Smartphone
Newest First  |  Oldest First  |  Threaded View
Page 1 / 3   >   >>
RaimeV632
50%
50%
RaimeV632,
User Rank: Apprentice
9/14/2016 | 12:08:34 PM
Boyfriends phone hack
Ok so my boyfriend had his phone hacked I'm pretty sure due to him receiving notifications on lock screen but then nothing being there and his phone being really really slow. And battery low all the time. But not only that when he was pushing a button in chrome it copied something and he pasted into a file or something and his phone started copying when hurting a button. When he would paste it random things would appear. He is thinking that everything that was pasted was pics and message clips off his phone. But I am thinking these items were never from his phone. Would you know and what does he do about this hack?
AnthonyT219
50%
50%
AnthonyT219,
User Rank: Apprentice
6/1/2016 | 6:12:08 PM
pc malware and trojans
Hi everyone, My PC has gotten malware and trojans on it that my virus software is not detecting and wiping out, Is there software on the market that may be able to find and wipe it off my PC? Oh and is Titanium backup for pc's too?
AnthonyT219
50%
50%
AnthonyT219,
User Rank: Apprentice
6/1/2016 | 6:03:30 PM
Re: The Benefits of Rooting-
Hi is Titanium Backup for pc's too? Cause my pc with Windows 10 has gotten malware and probably trojans that none of my software is finding, and i need to back up certain files before having a computer tech clean up my pc and reinstall Windows 10, unless there is great software i can buy to find thealware and trojans and wipe them off my pc, please help.
AnthonyT219
50%
50%
AnthonyT219,
User Rank: Apprentice
6/1/2016 | 5:46:59 PM
Re: secure android mobiles
Lookout is also a pretty good app too, you can even log onto it from a pc or anyother web capable device to know where your phone is if it gets stolen, and i also suggest locking the screen with either a passcode or the pattern lock.
AliciaT583
50%
50%
AliciaT583,
User Rank: Apprentice
4/29/2016 | 3:28:55 PM
no longer in control of my own phone
Your article is so my situation atm. My partner is a victim of fraud,(online purchase) leaving e-bay (the add site) & dealing with seller via e-mail, opened the porthole, 1of the 1st emails flashed an R rated pic of my partner of course we couldn't find it. Worried we used mine. I then installed an app from Google play, to help sort my "phone's issues" im not a tech savvy person. From then on it got worse. My phone became rooted, csc files were modified & my phone controlled by? I have that green man, he controls all my apps wifi email F/B. So factory reset 4 me. It took me 2yrs to "get with the times" & enjoy my Samsung & not hate technology, I have all information written down on good old paper. I will get re-connect my smartphone life but I will be smarter in my protection. This incident has devastated me, I want to track this down & stop it. I am posting my story everywere!!
LTCassity
50%
50%
LTCassity,
User Rank: Apprentice
3/19/2016 | 2:56:49 PM
Re: Good Advice from Mathew J. Schwartz
I have a android phone and have a hacker which has control of my fb and email accounts. every time I make a new account in either place they change the pasword so I cannot re-enter. I believe that they have my IP address and I am getting a new phone which I hope helps. any good advice guys.
LiveMsic
50%
50%
LiveMsic,
User Rank: Apprentice
5/14/2015 | 7:50:33 PM
Re: Good Advice from Mathew J. Schwartz
The answer is, of course it is.
DennisC_VA
50%
50%
DennisC_VA,
User Rank: Strategist
3/9/2015 | 5:03:25 PM
Good Advice from Mathew J. Schwartz
Beyond my earlier comment directed towards the other commenter and their issue involving text messages, I enjoyed reading this article and found Mathew's advice really solid.  After working in various support capacities for the past nineteen years, I have seen both "average" users with normal issues and "extreme" users with 'You did what?!?' issues.  If we can compare our Smartphones to our cars for a moment, the idea "hacking" the engine control module on a car sounds pretty intimidating to most people - sure, MAYBE it is possible to improve the mileage a little, but what is being risked in the process?  Also, if you return to the dealer or even a neighborhood auto mechanic with a car that has been "modified", do not be surprised when they refuse to work on it!  Similarly, is the cellphone carrier going to adopt a similar position IF something does not go smoothly with an altered Smartphone device?  There is risk and liability in everything we do, whether with our computers, Smartphones, other Internet-capable devices or even our cars; so it is really worth considering the true risks of having "fun" with Rooting a device versus the ultimate cost down the road.
DennisC_VA
100%
0%
DennisC_VA,
User Rank: Strategist
3/9/2015 | 4:24:54 PM
Re: Specific texts were deleted from my phone.
It may be impossible to know for certain whether the phone's Operating System or Messaging capability has been compromised, and the longer you wait the more "damage" may be done.  If you think the phone is behaving in a manner inconsistent with its original 'Out-of-the-Box' (fresh from the store) behavior, I recommend performing the Factory Reset.  Only the user themselves can determine whether the value of past incriminating "evidence" is worth retaining versus the potential for future harm being done by an unauthorized person again using a compromised device.  This is pretty new territory for users of these devices and I suspect there are issues which may quickly exceed the major carriers' Technical Support services abilities.  Yes, they can take a report of suspicious behavor BY the device, but ultimately they are likely to instruct on performing the Factory Reset as a solution; it is simply the most effective way to deal with unknowns.  **NOTE: To preserve legally incriminating data on a Smartphone device, I think it would have to be powered off, have the battery removed and even go so far as to place it in a electromagnetically shielded pouch IF there is really "bad" stuff on it. **
GerardoF416
50%
50%
GerardoF416,
User Rank: Apprentice
2/15/2015 | 2:51:10 PM
I ben hack
I, ben hack I,m 100% I,no my phone is goin crazy whit my. Maseges voiz recordin I, do not what To do can enibati heelp
Page 1 / 3   >   >>


6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
6 Reasons Why Employees Violate Security Policies
Ericka Chickowski, Contributing Writer, Dark Reading,  10/16/2018
Getting Up to Speed with "Always-On SSL"
Tim Callan, Senior Fellow, Comodo CA,  10/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: Too funny!
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.