Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Android Security: 8 Signs Hackers Own Your Smartphone
Newest First  |  Oldest First  |  Threaded View
Page 1 / 4   >   >>
gtjonzer
50%
50%
gtjonzer,
User Rank: Apprentice
6/29/2020 | 2:36:14 PM
Android phone hacked
I have a question regarding my phone possibly being owned.. I believe that by downloading images on browsers that someone has hijacked my phone. Sometimes I find unfamiliar tabs when opening browsers. Also battery burns fast and once on a different phone Google canceled my account for way too much rsoid volume of data. I think it may be happening again. Sometimes I find unfamiliar data files in my directory or under the Android data folder. Usually it contains my configuration in a sys file but lately there a .um directory containing a sysid.dat file which has a permalink url to Facebook that I'm not sure where it leads.... But if been getting hacked on FB too. I'd reset but it won't allow me into the recovery mode. Moto e6 . Any help?
RaimeV632
50%
50%
RaimeV632,
User Rank: Apprentice
9/14/2016 | 12:08:34 PM
Boyfriends phone hack
Ok so my boyfriend had his phone hacked I'm pretty sure due to him receiving notifications on lock screen but then nothing being there and his phone being really really slow. And battery low all the time. But not only that when he was pushing a button in chrome it copied something and he pasted into a file or something and his phone started copying when hurting a button. When he would paste it random things would appear. He is thinking that everything that was pasted was pics and message clips off his phone. But I am thinking these items were never from his phone. Would you know and what does he do about this hack?
AnthonyT219
50%
50%
AnthonyT219,
User Rank: Apprentice
6/1/2016 | 6:12:08 PM
pc malware and trojans
Hi everyone, My PC has gotten malware and trojans on it that my virus software is not detecting and wiping out, Is there software on the market that may be able to find and wipe it off my PC? Oh and is Titanium backup for pc's too?
AnthonyT219
50%
50%
AnthonyT219,
User Rank: Apprentice
6/1/2016 | 6:03:30 PM
Re: The Benefits of Rooting-
Hi is Titanium Backup for pc's too? Cause my pc with Windows 10 has gotten malware and probably trojans that none of my software is finding, and i need to back up certain files before having a computer tech clean up my pc and reinstall Windows 10, unless there is great software i can buy to find thealware and trojans and wipe them off my pc, please help.
AnthonyT219
50%
50%
AnthonyT219,
User Rank: Apprentice
6/1/2016 | 5:46:59 PM
Re: secure android mobiles
Lookout is also a pretty good app too, you can even log onto it from a pc or anyother web capable device to know where your phone is if it gets stolen, and i also suggest locking the screen with either a passcode or the pattern lock.
AliciaT583
50%
50%
AliciaT583,
User Rank: Apprentice
4/29/2016 | 3:28:55 PM
no longer in control of my own phone
Your article is so my situation atm. My partner is a victim of fraud,(online purchase) leaving e-bay (the add site) & dealing with seller via e-mail, opened the porthole, 1of the 1st emails flashed an R rated pic of my partner of course we couldn't find it. Worried we used mine. I then installed an app from Google play, to help sort my "phone's issues" im not a tech savvy person. From then on it got worse. My phone became rooted, csc files were modified & my phone controlled by? I have that green man, he controls all my apps wifi email F/B. So factory reset 4 me. It took me 2yrs to "get with the times" & enjoy my Samsung & not hate technology, I have all information written down on good old paper. I will get re-connect my smartphone life but I will be smarter in my protection. This incident has devastated me, I want to track this down & stop it. I am posting my story everywere!!
LTCassity
50%
50%
LTCassity,
User Rank: Apprentice
3/19/2016 | 2:56:49 PM
Re: Good Advice from Mathew J. Schwartz
I have a android phone and have a hacker which has control of my fb and email accounts. every time I make a new account in either place they change the pasword so I cannot re-enter. I believe that they have my IP address and I am getting a new phone which I hope helps. any good advice guys.
LiveMsic
50%
50%
LiveMsic,
User Rank: Apprentice
5/14/2015 | 7:50:33 PM
Re: Good Advice from Mathew J. Schwartz
The answer is, of course it is.
DennisC_VA
50%
50%
DennisC_VA,
User Rank: Strategist
3/9/2015 | 5:03:25 PM
Good Advice from Mathew J. Schwartz
Beyond my earlier comment directed towards the other commenter and their issue involving text messages, I enjoyed reading this article and found Mathew's advice really solid.  After working in various support capacities for the past nineteen years, I have seen both "average" users with normal issues and "extreme" users with 'You did what?!?' issues.  If we can compare our Smartphones to our cars for a moment, the idea "hacking" the engine control module on a car sounds pretty intimidating to most people - sure, MAYBE it is possible to improve the mileage a little, but what is being risked in the process?  Also, if you return to the dealer or even a neighborhood auto mechanic with a car that has been "modified", do not be surprised when they refuse to work on it!  Similarly, is the cellphone carrier going to adopt a similar position IF something does not go smoothly with an altered Smartphone device?  There is risk and liability in everything we do, whether with our computers, Smartphones, other Internet-capable devices or even our cars; so it is really worth considering the true risks of having "fun" with Rooting a device versus the ultimate cost down the road.
DennisC_VA
100%
0%
DennisC_VA,
User Rank: Strategist
3/9/2015 | 4:24:54 PM
Re: Specific texts were deleted from my phone.
It may be impossible to know for certain whether the phone's Operating System or Messaging capability has been compromised, and the longer you wait the more "damage" may be done.  If you think the phone is behaving in a manner inconsistent with its original 'Out-of-the-Box' (fresh from the store) behavior, I recommend performing the Factory Reset.  Only the user themselves can determine whether the value of past incriminating "evidence" is worth retaining versus the potential for future harm being done by an unauthorized person again using a compromised device.  This is pretty new territory for users of these devices and I suspect there are issues which may quickly exceed the major carriers' Technical Support services abilities.  Yes, they can take a report of suspicious behavor BY the device, but ultimately they are likely to instruct on performing the Factory Reset as a solution; it is simply the most effective way to deal with unknowns.  **NOTE: To preserve legally incriminating data on a Smartphone device, I think it would have to be powered off, have the battery removed and even go so far as to place it in a electromagnetically shielded pouch IF there is really "bad" stuff on it. **
Page 1 / 4   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-39229
PUBLISHED: 2021-09-20
Apprise is an open source library which allows you to send a notification to almost all of the most popular notification services available. In affected versions users who use Apprise granting them access to the IFTTT plugin (which just comes out of the box) are subject to a denial of service attack...
CVE-2021-41083
PUBLISHED: 2021-09-20
Dada Mail is a web-based e-mail list management system. In affected versions a bad actor could give someone a carefully crafted web page via email, SMS, etc, that - when visited, allows them control of the list control panel as if the bad actor was logged in themselves. This includes changing any ma...
CVE-2021-34650
PUBLISHED: 2021-09-20
The eID Easy WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the error parameter found in the ~/admin.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 4.6.
CVE-2021-41082
PUBLISHED: 2021-09-20
Discourse is a platform for community discussion. In affected versions any private message that includes a group had its title and participating user exposed to users that do not have access to the private messages. However, access control for the private messages was not compromised as users were n...
CVE-2020-16630
PUBLISHED: 2021-09-20
TI’s BLE stack caches and reuses the LTK’s property for a bonded mobile. A LTK can be an unauthenticated-and-no-MITM-protection key created by Just Works or an authenticated-and-MITM-protection key created by Passkey Entry, Numeric Comparison or OOB. Assume that...