TelecomTV TelecomTV
  • News
  • Videos
  • Channels
  • Events
  • Directory
  • Smart Studio
  • Surveys
  • Debates
  • Perspectives
  • DSP Leaders World Forum
  • DSP Leaders
  • Great Telco Debate
    • |
    • Follow
    • |
    • Subscribe
  • |
  • More
  • Webcasts
  • Surveys
  • Debates
  • Perspectives
  • Great Telco Debate
  • |
  • Follow TelecomTV
  • |
    • Subscribe
    • |
  • About
  • Privacy
  • Help
  • Contact
  • Follow TelecomTV
  • About
  • Privacy
  • Help
  • Contact
  • Sign In Register Subscribe
    • Subscribe
    • Sign In
    • Register
  • Search

News

News

Don’t Look Now, But You’ve Been Phone-jacked!

Aug 8, 2013

In the last blog, “Android phones playing “I spy” at home and at work,” I looked at the rising trend in spyphone malware, which can turn an ordinary Android phone in to a cyber-espionage tool to track a victim’s location, download personal information and contacts, intercept and send messages, record conversations and take pictures without them knowing. For individuals it can lead to identify theft and fraud. In the BYOD context, it can be installed surreptitiously on an employee’s phone and used for industrial or corporate espionage.

Last week, USA Today, VentureBeat, and CNN Money caught up with me at the Black Hat security event in Las Vegas to see a demonstration of how spyphone software can be injected inside a fully functioning version of a popular game like “Angry Birds” without the owner’s knowledge. When the infected application is installed on an Android smartphone or tablet, the attacker takes complete control of the device.

The open nature of the Android operating system makes Droid owners prime targets for hackers. Anti-virus alone is not enough to stop all malware. It needs to be complemented by a network-based approach to security. Thus service providers can play a value add-added role for subscribers by deploying security software on their networks to spot malicious and unusual device activity and immediately notify device owners with instruction on how to remove the threat.

Watch below the Kindsight video (2’46) on ‘How To Build a SpyPhone.’

Related Topics
  • Analysis & Opinion,
  • News

More Like This

Open Networking

The TelecomTV Snapshot: The Great Telco Debate 2020 - CSP Highlights

Jan 15, 2021

Security

What’s up with… Xiaomi, Bouygues Telecom, Qualcomm

Jan 15, 2021

Satellite

OneWeb or another, it’s gonna get there...

Jan 15, 2021

Open Networking

Deutsche Telekom switches on its disaggregated broadband network

Jan 15, 2021

Access Evolution

What’s up with… Cisco and Acacia, O-RAN Alliance, Nokia

Jan 14, 2021

Email Newsletters

Stay up to date with the latest industry developments: sign up to receive TelecomTV's top news and videos plus exclusive subscriber-only content direct to your inbox – including our daily news briefing and weekly wrap.

Subscribe

Top Picks

Highlights of our content from across TelecomTV today

1:4:29

Great Telco Debate: Live Debate – Day 2 (On-demand)

1:18:20

Great Telco Debate: Live Debate – Day 3 (On-demand)

43:08

Developing an ecosystem for vRAN

1:5:11

Great Telco Debate: Live Debate – Day 1 (On-demand)

  • TelecomTV
  • Decisive Media

TelecomTV is produced by the team at Decisive Media

Menu
  • News
  • Videos
  • Channels
  • Directory
  • Smart Studio
 
  • Surveys
  • Debates
  • Perspectives
  • Events
  • About Us
Our Brands
  • TelecomTV Tracker
  • TelecomTV Perspectives
  • DSP Leaders
  • DSP Leaders World Forum
  • The Great Telco Debate
Get In Touch
[email protected]
+44 (0) 207 448 1070

Request a Media Pack

Follow
  • © Decisive Media Limited 2021. All rights reserved. All brands and products are the trademarks of their respective holder(s).
  • Privacy
  • Terms
  • Legal Notices