Robert Siciliano Identity Theft Expert
Technology makes it easier to connect with the people in your life, but it can also enable others to connect to you without your knowledge.
The engine behind this is RATs, AKA â€œRemote Access Trojans.â€ RATâ€™s can capture every keystroke typed, take a snapshot of your screen and even take rolling video of your screen via a webcam. RATâ€™s covertly monitor a PC generally without the userâ€™s knowledge. RATâ€™s are a criminal hackers dream and are the key ingredient in spyware. Common RATâ€™s are the LANRev Trojan and â€œBackdoor Orificeâ€.
Now RATs come to mobile phones. When somebody remotely activates your phone, you’re not going to know it and they can use that phone to monitor the conversations in the room you’re in. Your phone could be sitting next to you while you are watching TV, and somebody can actually log into your phone and can actually watch what you are watching on television.
Cell Phone Spying Software is Affordable and Powerful. I worked with Good Morning America (GMA) on this issue.
GMA found thousands of sites promoting cell phone spying software, boasting products to “catch cheating spouses,” “bug meeting rooms” or “track your kids.” Basic cell phone spying software costs as little as $50.” Someone can easily install a spyware program on your phone that allows them to see every single thing you do all day long, via the phone’s video camera. GMA spent $350 to get the features that remotely activate speaker phones, intercept live calls and instantly notify you every time a call is made.
A virus, called â€œRed Browser,â€ was created specifically to infect mobile phones using Java. It can be installed directly on a phone, should physical access be obtained, or this malicious software can be disguised as a harmless download. Bluetooth infrared is also a point of vulnerability. Once installed, the Red Browser virus allows the hacker to remotely control the phone and its features, such as the camera and microphone. For all you techies who want to take a crack at decoding tricks for defeating SSL on mobile phones see Mobile Security Labs HERE.
If history is any indication of the future, mobile phones, just like computers, will soon be regularly hacked for financial gain. Prepare for mCrime in the form of credit card fraud, identity theft and data breaches.
To protect your mobile phone:
Spyware can be installed remotely or directly on the phone. Never click on links in a text or email that could contain a malicious link to a download.
Always have your phone with you and never let it out of your site or let anyone else use it.
Make sure your phone requires a password to have access. If your phone is password protected it will be difficult to install spyware.
If you suspect spyware on your phone re-install the phones operating system. This can be done by consulting your user manual or calling your carriers customer service to walk you through it.
And protect your identity.
Get a credit freeze and follow the steps for your particular state. This is an absolutely necessary tool to secure your credit. In most cases, it prevents new accounts from being opened in your name. This makes your Social Security number useless to a potential identity thief.
Invest in anti-virus and keep it auto-updated and check out my spyware killer IDTheftSecurty HERE
Robert Siciliano Identity Theft Speaker discussing Mobile Phone Spying on Good Morning America