TelecomTV TelecomTV
  • News
  • Videos
  • Channels
  • Events
  • Network Partners
  • Industry Insights
  • Directory
  • Newsletters
  • Open RAN
  • Digital Platforms and Services
  • 5G
  • Access Evolution
  • Private Networks
  • Cloud Native
  • Edge
  • Open Networking
  • Sustainability
  • AI, Analytics and Automation
  • 6G Research and Innovation
  • Security
  • More Topics
  • Network Partners
  • Industry Insights
  • Directory
  • Newsletters
  • |
  • About
  • Contact
  • |
  • Connect with us
  • 5G
  • 6G Research and Innovation
  • Access Evolution
  • AI, Analytics and Automation
  • Cloud Native
  • Digital Platforms and Services
  • Edge
  • Open Networking
  • Open RAN
  • Private Networks
  • Security
  • Sustainability
  • Connect with TelecomTV
  • About
  • Privacy
  • Help
  • Contact
  • Sign In Register Subscribe
    • Subscribe
    • Sign In
    • Register
  • Search

News

News

Don’t Look Now, But You’ve Been Phone-jacked!

Aug 8, 2013

In the last blog, “Android phones playing “I spy” at home and at work,” I looked at the rising trend in spyphone malware, which can turn an ordinary Android phone in to a cyber-espionage tool to track a victim’s location, download personal information and contacts, intercept and send messages, record conversations and take pictures without them knowing. For individuals it can lead to identify theft and fraud. In the BYOD context, it can be installed surreptitiously on an employee’s phone and used for industrial or corporate espionage.

Last week, USA Today, VentureBeat, and CNN Money caught up with me at the Black Hat security event in Las Vegas to see a demonstration of how spyphone software can be injected inside a fully functioning version of a popular game like “Angry Birds” without the owner’s knowledge. When the infected application is installed on an Android smartphone or tablet, the attacker takes complete control of the device.

The open nature of the Android operating system makes Droid owners prime targets for hackers. Anti-virus alone is not enough to stop all malware. It needs to be complemented by a network-based approach to security. Thus service providers can play a value add-added role for subscribers by deploying security software on their networks to spot malicious and unusual device activity and immediately notify device owners with instruction on how to remove the threat.

Watch below the Kindsight video (2’46) on ‘How To Build a SpyPhone.’

Related Topics
  • Analysis & Opinion,
  • News

More Like This

Digital Platforms & Services

What’s up with… Colt, 5G’s impact on GDP, Cisco

Aug 18, 2022

5G

Satellite firm’s 5G-based ‘one global network’ dream gets closer to reality

Aug 18, 2022

Security

Big trouble in little islands

Aug 18, 2022

Open RAN

Mavenir takes out $95m loan as radio R&D costs ramp up

Aug 18, 2022

5G

What’s up with… China Telecom, 5G in Malaysia, Verizon Business

Aug 17, 2022

Email Newsletters

Stay up to date with the latest industry developments: sign up to receive TelecomTV's top news and videos plus exclusive subscriber-only content direct to your inbox – including our daily news briefing and weekly wrap.

Subscribe

Top Picks

Highlights of our content from across TelecomTV today

0:46

The Cloud Native Telco Summit returns this September!

8:32

Azita Arvani on Being a Female Leader at Rakuten Symphony

16:19

AT&T Amy Zwarico on securing telco applications in the public cloud

1:44

Join us for the greatest industry debate of the year!

TelecomTV
Company
  • About Us
  • Media Kit
  • Contact Us
Our Brands
  • DSP Leaders World Forum
  • Great Telco Debate
  • TelecomTV Events
Get In Touch
[email protected]
+44 (0) 207 448 1070
Connect With Us
  • Privacy
  • Cookies
  • Terms of Use
  • Legal Notices
  • Help

TelecomTV is produced by the team at Decisive Media.

© Decisive Media Limited 2022. All rights reserved. All brands and products are the trademarks of their respective holder(s).