Category Archives: Smartphone

Smartphone security is now a big problem. The main players in the iPhone and Android market are trying by all means to protect them from hackers who, they always seem to have a head start.

Potential security flaw discovered on Samsung mobiles

For some time now, several South Korean celebrities have been the victims of blackmail and extortion by some people who are probably hackers.

Indeed, their extortionators threaten to disclose private photos and videos if they do not agree to pay them a certain amount of money. The data on which threats are based includes private photos and videos and now intimate correspondence.

This article will also interest you: Security flaw in Samsung S10 fingerprint reader

The thing that all the victims have in common would be that they especially have Samsung Galaxy branded smartphones. 

Could this be a vulnerability attributable to the phone brand?

It is common in South Korea that celebrities such as musicians and several select personalities are routinely targeted by hackers. it has become a successful market for the latter, who take advantage of this opportunity to routinely extort hundreds of thousands of dollars from them. And this is not likely to stop any time soon because the majority of victims pay without any challenge for fear of having their privacy revealed to the public with the disclosure of videos or photos that are quite compromising. The amounts extorted from the stars are estimated to be $25,000 and $500,000 or more in some cases. However, only "more than 10 cases of extortion" were confirmed by the victims.

A famous South Korean actor even had his personal data disclosed after refusing to pay. It was a private conversation. Without any authority can truly confirm this, it is said that several other stars have agreed to pay the ranks are demanded by the criminals as long as this proved that he did have their personal data in their possession. Threats often go to their victim's family or close friends. Hackers tend to warn them of the consequences of a potential disclosure of the data in case the victims refuse to pay the ransoms demanded.

To explain these chain hacks that South Korean stars, the hypothesis was made that there would still be a security flaw in phones commonly used by them Samsung brand. But it is also possible that the star victims did not adopt the security measures they should take to reassure themselves at this level, such as the double authentication for example where the use of passwords that would not have already been hacked.

For its part, the Korean firm has not yet reacted to this matter. Many experts really doubt that the problem comes from Samsung otherwise this silence would have been more than guilty. And since no complaints have yet been made on the side of the stars, it is likely that the firm will be out of the question. However, we must not go too far. Investigations will continue and information will soon fall.

Now access an unlimited number of passwords:

Check out our hacking software

The OnePlus brand offers a premium for every security flaw discovered in its system

The Chinese brand of smartphones and computer tools is reportedly willing to offer up to $7,000 for the discovery of a security flaw in its system.

This announcement has been made since December 19, last week. The premium announced by the Chinese brand ranges from $50 to $7,000 precisely. Like many computer manufacturers, it has finally decided to launch its famous Bug Bounty. this was done in partnership with the hacker-discovery company HackerOne. Let's not forget that the latter is known in computer security especially when it comes to identifying and anticipating threats.

This article will also interest you: The social network Facebook will expand the capabilities of its bug bounty program

This was probably motivated by the famous attack Chinese brand towards the end of last November. Indeed, OnePlus servers in the summer attacked by hackers who managed to steal thousands of personal data belonging to the company's customers mark. These include: identifying information, such as names and surnames, addresses e-mail, not to mention ordering his history. Going back to 2018, precisely during the month of January, the Chinese brand's website were hacked by hackers who allowed themselves to steal bank-like contact information to several customers, a phenomenon that has pushed brand to suspend fashions bank cards on its platform for quite some time.

The announcement was made in a press release that was issued last Thursday, December 19, 2019. The Chinese company has publicly announced that it has decided to take several drastic measures to strengthen the security of its site, especially data belonging to its customers. It is in this vein that she first launched her "bug Bounty" program in French bug hunter. To clarify this program is open to anyone who feels able to compete. And as mentioned above, the $50 reward for a low-risk vulnerability that can go up to $7,000 for vulnerabilities considered special. The Bounty bug scale is presented as follows:

  • Special flaws: $7,000
  • Critical flaws: between $750 and $1500
  • High-level dangerousness flaws: between $250 and $750
  • Intermediate-level faults: between $100 and $250
  • Low-level faults: between $50 and $100

Even if this program has nothing to do with that of Google which offers up to 1 million dollars, there are no no less than it is likely to motivate many people who would like to try their luck. And as mentioned above, this program is open to all.

With this initiative, the Chinese group further reinforces its long-time desire to strengthen the security of its users' data. This commitment takes shape with the company HackerOne recognized in the field as a specialist. This is expressed in particular by these large customers who are not least. Examples include the U.S. Department of Defense, General Motors, the automaker, PayPal, Twitter, Nintendo, and Qualcomm. For OnePlus CEO Pete Lau, "The confidentiality of the information our users entrust to us is at the heart of our pr[…]iorities These two projects demonstrate OnePlus's commitment to improving user data protection through more secure systems and better data lifecycle management."

Now access an unlimited number of passwords:

Check out our hacking software

Mobile phones have become prime targets for spies

It is very common today for hacks that directly affect mobile phones.

This could be explained in particular by the explosion of cell phone use around the world, which have become increasingly indispensable for our daily lives. In fact, the mobile phone has become the most used tool in the world without any challenge. This will of course create a growing interest in the criminal class. Computer security expert Steve Waterhouse noted, "I've seen an upsurge here" in cell phone attacks.

This article will also interest you: Smartphones are the weak link of security in corporate networks

"It's growing fast, because i[le cellulaire]t's the medium increasingly used to communicate," explained Eric Lessard, a private IT security consultant. For the latter he more needs to be more concerned about the phishing technique, which will allow easily to a hacker to install malware on the mobile phone target by misleading it. "[Le pirate]make sure you're incentivizing to click a link, such as a contest, by posing as a friend. You can only see fire. He noted. "There are even solutions that to take full control of the device, to see exactly the content of the screen," continues Mr. Lessard.

According to our expert, people who try to hack mobile phones are not always computer geniuses.Indeed, it There are now many computer tools to make it easier to this kind of illicit activity. It is very easy to get it on the internet. Whether it's free or paid there are many forms and levels of piracy. "A 12-year-old who can read and who is the "technological" will be able to do so, explained Mr. Lessard. "Everyone is at risk. Everybody! Noted Sophie Thériault, spokeswoman for crypto.Quebec City, a structure that is interested in privacy and computer surveillance.

It should also be noted that all of these practices espionage and cell phone hacking, which is the majority of the in a context of control or voyeurism. "There's software that almost allow you to take full control of the cell phone, without that its owner doesn't know. They even allow calls to be made from the device without leaving a trace, unless you check your reading monthly. noted Guillaume Tremblay, president of Delve Labs. He adds by other than people being targeted for reasons of voyeurism or gain lure: "If the person's cell phone is not up to date and the criminal took the time to target his attack, he said, the person will not see nothing. ».

A majority of mobile phone hacking cases reported in Quebec, according to Thériault, are believed to be triggering domestic violence events. And the ability for spies to get software of this type is very easy, so the cases are more and more extensive. "The former spouses take remote control of their ex-flame's phone and go through a thorough search," she warns cautiously. It sounds simple, but it can do a lot of damage. ».

Now access an unlimited number of passwords:

Check out our hacking software

Smartphones are the weak link in security in corporate networks

To talk about corporate security at the network computing level.

Experts in the field tend to refer to the internal and external threat. All the considerations at this level can be explained by the fact that the problem can never come from one place. From what point of view, it was always understood as a driving solution to isolate the internal system from all interactions coming from outside. And almost all initiatives in this area are moving in this direction.

This article may also be of interest to you: Cybercriminals and Social Networks: A combination not to be overlooked for business security

On the other hand, it must be remembered that in a conventional security system, there are multi-tiered security measures. From routers to servers to physical security and security software deployment to access to certain elements of terminals called Endpoint Security that can be seen as serious threats to internal security.

However, in their safe development, security officials tend to misunderstand or lack vigilance towards certain devices that also have access to their company's information system. those terminals are machines that belong to the employees themselves. It's all about including smartphones and their personal computers they use at certain times to connect to the network of The company. In this context, they use the most often some of their own applications. Experts today do not hesitate to acknowledge that applications that are located in employee-specific terminals, i.e. smartphones in terms of computer security and danger is of a very high standard.

The security of the mobiles used by employees is to learn a very high level.

Let us first ask ourselves the question of the extent to which a mobile device could prove dangerous for a company network. Here we take as point of attack, the applications installed most often on smartphones or other mobiles. Indeed, who says today mobile speaks of installed applications most often in any way. These applications are in large part source of infection in the user's main terminal. and it can easily switch from an employee's device to the company's network by a simple gesture of connection. Let's take the example of an employee who consults a corrupted email via his mobile phone. This email will infect his smartphone but will not have any immediate influence on perhaps because it is not the Immediate target. Then the latter will connect to a company device that is directly connected to the network. It will then infect this terminal, which in turn will attack the others. Here's what the danger of an employee-specific mobile device is.

In some respects, the applications used are Trojans. an app originally that is fully usable for a clear and determined and often lawful goal. But in practice hides an interest other than what it was put for available to users. it then houses another program in the background, malicious to gain access to and control of a system. we call terminals that use this kind of "Zombies" application in the language of computer security.

from this fact, navigation will encourage the spread of mobile malware to terminals connected to the network. So a company that doesn't take the measurements adequate to ensure the safety of the terminals of its employees during the course literally at his loss.

It is highly recommended to have a culture of COMPUTER security in the company. Because this stands out as a major asset that will prevent several faults or accidents. In this way, it is usually necessary to recite its staff to use methods of securing their personal terminals, the installation of antivirus also would be a basic preventive action.

Now access an unlimited number of passwords:

Check out our hacking software

Samsung blocked by Alibaba and Tencent

Since the discovery of the security on its biometric fingerprinting system digital, the Korean giant has been blocked by several financial institutions in particular, the two Chinese giants Alibaba and Tencent.

Despite Samsung's security patches on these fingerprint readers that were vulnerable, Chinese institutions in particular two online payment giants such as WePay and Alipay, as well as a banking institution, the Bank of China did not want to take any risks. as a result they simply blocked authentication systems for online payment via Samsung's service.

This article will also interest you: Security flaw in Samsung S10 fingerprint reader

It should also be noted that the Chinese Alibaba and Tencent alone account for 90% of the payments mobile in the local Chinese market and by disabling payment methods via Samsung's fingerprint confirmation service, for the Galaxy s10 and and the Galaxy Note 10, there is no doubt that this is a big loss for the Korean firm.

Last Monday, the WePay platform is a subsidiary of the Tencent Group, has deactivated for the Samsung models affected by the security breach. It was immediately followed by Alipay, the popular mobile online payment structure in China owned by Ant Financial, a company backed by giant Alibaba. And that's what has continued to affect other institutions such as the Bank of China she also hesitated to get rid of it.

Samsung had since announced moment a security patch to fill the problem, and let it these smartphones had begun to receive security patches. This did not block at all decisions of its structures to end samsung's payment tool. he must admit that for some time Korean society has been trying to reassure all of its users to prevent this problem from being dramatized higher point. "Samsung Electronics takes product safety very much and will ensure that security is enhanced through continuous improvement and updates to improve biometric authentication features. declared society.

but on the other hand the reaction of China's financial institutions is understandable. Indeed, the security of mobile transactions is a very important issue for China. In fact, nearly half of the Chinese population uses the payment method, whether online or offline, smartphones are essential for financial transactions in this country. Already in June of this year there were very many, nearly 600 million smartphone users who use their terminals to carry out financial transactions. About 38 million more than in 2018 according to a report published in China daily during the month of September this year, in the figures come from the China Internet Network Information Center (CNNIC). Ali-Baba's group holds more than 53% of the market share in the mobile payment sector in China. As for Tencent, the shares amount to 40%.

Now access an unlimited number of passwords:

Check out our hacking software