Search This Blog

Friday, 8 April 2016

COMMON CYBER CRIMES ASSOCIATED WITH CELL PHONES


COMMON CYBER CRIMES ASSOCIATED WITH CELL PHONES

BLUE BUGGING

Almost every mobile cell phone is embedded with Bluetooth technology.

We use Bluetooth for sharing photos,audio or video files etc.


 
It allows the hacker to take over complete control over your mobile phone.The victim 

cannot even realise that his mobile cell phone is attacked,because even if the 

Bluetooth device is disabled or turned off the mobile cell phone can be victim of this 

attack. Bluebugging  allows the hacker to read the information in your mobile cell 

phone ,he can access calendar,address book etc.he can make calls and even send 

messages.The hacker can even listen to the conversation of your mobile phone.

Every time you receive a call on your infected phone the call is forwarded to the 

hacker and he can listen the conversation.





VISHING






This is a tool for committing financial crime by using mobile.Mobile phones are used 

for online shopping and managing banking transactions.

This has made mobile phone an easy victim of Vishing and Hacker is to get easy 

money.These attacks are similar to phishing attacks.It includes identify theft like credit 

cards number and other secret information.




SMISHING



It signifies SMS(Short Message Service),is the common term for sharing message on 

mobile phone.

Smishing is an security attack in which the user is sent an SMS posin as a lucrative 

service that indulges them into exposing their personal information which is later 

misused.This is also used for introducing a malware in the cellphone of the user.


MALWARE


 
This is one of the biggest threat to mobile phones.It is a program designed to perform 

malicious activities in the device infected.Malware enters and functions in the victim's 

mobile without his knowledge and perform several malicious activities like usage of 

sms,file transfer,downloading files from internet,talk time etc.




























No comments:

Post a Comment