{"id":256,"date":"2016-07-06T17:34:19","date_gmt":"2016-07-07T00:34:19","guid":{"rendered":"https:\/\/www.palomar.edu\/police\/?page_id=256"},"modified":"2017-03-15T16:12:09","modified_gmt":"2017-03-15T23:12:09","slug":"hackers-exploit-flaws-in-mobil-phones-security","status":"publish","type":"page","link":"https:\/\/www.palomar.edu\/police\/hackers-exploit-flaws-in-mobil-phones-security\/","title":{"rendered":"Hackers Exploit Flaws in Mobil Phones\u2019 Security"},"content":{"rendered":"<p><span style=\"font-family: 'Georgia',serif\"><span style=\"color: #000000\">Owners of smartphones have developed a sense of security, using them as if they were sitting in front of their computers at home. Once used for voice transmission only, mobile phones, or smartphones, have grown to become devices used for shopping, bill paying, bank transactions, and a host of other applications. Unfortunately, they are not nearly as secure as most users think they are. Hackers have found a number of flaws, and are capable of exploiting\u00a0them.<\/span><\/span><\/p>\n<p><span style=\"font-family: 'Georgia',serif\"><span style=\"color: #000000\">\u00a0Mobile phones are everywhere. The ubiquitous devices have become so commonplace that it is easy to believe that nearly everyone has\u00a0one.\u00a0 Owners of these devices have had a sense of security, using them as if they were sitting in front of their computers at home. Once used for voice transmission only, mobile phones, or smart phones, have grown to become devices used for shopping, bill paying, bank transactions, and a host of other\u00a0applications.<\/span><\/span><\/p>\n<p><span style=\"font-family: 'Georgia',serif\"><span style=\"color: #000000\">Unfortunately, they are not nearly as secure as most users think they are. Hackers have found a number of flaws, and are capable of exploiting\u00a0them.\u00a0 The primary component of these breaches is <\/span><a href=\"http:\/\/www.computerweekly.com\/news\/4500251756\/Security-flaw-exposes-billions-of-mobile-phone-users-to-eavesdropping\"><span style=\"color: #0000ff\">Signal System 7<\/span><\/a><span style=\"color: #000000\"> (SS7,) which enables mobile roaming between two different phone service\u00a0providers.<\/span><\/span><\/p>\n<p><span style=\"font-family: 'Georgia',serif\"><span style=\"color: #000000\">As Computer Weekly <\/span><a href=\"http:\/\/www.computerweekly.com\/news\/4500251756\/Security-flaw-exposes-billions-of-mobile-phone-users-to-eavesdropping\"><span style=\"color: #0000ff\">reported<\/span><\/a><span style=\"color: #000000\">, hackers are able to monitor the target phone half a world away. As <\/span><a href=\"http:\/\/media.ccc.de\/browse\/congress\/2014\/31c3_-_6249_-_en_-_saal_1_-_201412271715_-_ss7_locate_track_manipulate_-_tobias_engel.html#video\"><span style=\"color: #0000ff\">demonstrated<\/span><\/a><span style=\"color: #000000\"> by an Australian television show, hackers in Australia access a mobile phone in Germany, recording the conversation of a German politician, and tracking his movements from thousands of miles\u00a0away.\u00a0 That demonstration\u00a0has also raised serious questions about the security of SMS verification systems used by online banking and e-mail\u00a0services.<\/span><\/span><\/p>\n<p><span style=\"font-family: 'Georgia',serif\"><span style=\"color: #000000\">The problem arises because international agreements require\u00a0all telecommunications providers to provide details of their subscribers through the SS7 system to another provider on request, including the name and contact details of the subscriber, as well as, crucially, the location of the nearest mobile phone\u00a0tower.<\/span><\/span><\/p>\n<p><span style=\"font-family: 'Georgia',serif\"><span style=\"color: #000000\">Using a man-in-middle attack, the breach is not a direct connection to the target device, but an interception of the target device\u2019s inbound and outbound signals. The signals are then recorded and forwarded to the intended recipient of the\u00a0signals.\u00a0 Correctly used, all this activity is invisible to the parties on the call. Additionally, it also allows the movements of a mobile phone user to be tracked on applications such as\u00a0Google\u00a0Maps.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Owners of smartphones have developed a sense of security, using them as if they were sitting in front of their computers at home. Once used for voice transmission only, mobile phones, or smartphones, have grown to become devices used for shopping, bill paying, bank transactions, and a host of other applications. Unfortunately, they are not&hellip; <a class=\"continue\" href=\"https:\/\/www.palomar.edu\/police\/hackers-exploit-flaws-in-mobil-phones-security\/\">Continue Reading<span> Hackers Exploit Flaws in Mobil Phones\u2019 Security<\/span><\/a><\/p>\n","protected":false},"author":10107,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"jetpack_post_was_ever_published":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-256","page","type-page","status-publish","hentry"],"acf":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P6Sp7b-48","_links":{"self":[{"href":"https:\/\/www.palomar.edu\/police\/wp-json\/wp\/v2\/pages\/256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palomar.edu\/police\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.palomar.edu\/police\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.palomar.edu\/police\/wp-json\/wp\/v2\/users\/10107"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palomar.edu\/police\/wp-json\/wp\/v2\/comments?post=256"}],"version-history":[{"count":3,"href":"https:\/\/www.palomar.edu\/police\/wp-json\/wp\/v2\/pages\/256\/revisions"}],"predecessor-version":[{"id":1047,"href":"https:\/\/www.palomar.edu\/police\/wp-json\/wp\/v2\/pages\/256\/revisions\/1047"}],"wp:attachment":[{"href":"https:\/\/www.palomar.edu\/police\/wp-json\/wp\/v2\/media?parent=256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}