DATA STEALING FROM E-MAIL

HOW TO STEAL DATA FROM AN E-MAIL? Social Engineering. Exploiting the Vulnerabilities in security. Keyloggers and browser monitoring. SOCIAL ENGINEERING- Social engineering is a collection of techniques used to manipulate people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery for information … Read more

MOBILE SAFEGUARDS AND SOLUTIONS

There are some solutions to secure our different types of mobile phones. Since new technologies are coming up we also need to be careful from our side to secure our mobile phones. ANDROID The most important steps you should take to sure your data is secure are: Keeping it private: The easiest way to keep … Read more

BLUETOOTH WEAKNESSES

ENCRYPTION The Bluetooth specification does not describe encryption, some manufacturers produce devices without encryption or the encryption mode is deactivated by factory setting. The E0 algorithm is used for Bluetooth encryption. The E0 encryption is a typical stream cipher. The plaintext is encrypted with XOR: plaintext XOR key-password. The cyclic redundancy check (CRC) checksum is … Read more

BLUETOOTH ATTACKS

BLUETOOTH ATTACKS ON MOBILE PHONES BLUESNARF: SNIFFING Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. This allows access to a calendar, contact list, emails and text messages, and on some phones users can copy pictures and private videos. Currently available programs … Read more

BLUETOOTH

WHAT IS BLUETOOTH? & HOW DOES IT WORK? Bluetooth is an open wireless protocol for exchanging data over short distances between devices. It’s not a wireless Internet connection like Wi-Fi. It’s a fast way to hook up devices without cords, such as headsets connected to cell phones, computers connected to wireless printers or keyboards, or … Read more

MOBILE SECURITY IMPORTANCE

“WHY IS MOBILE SECURITY IMPORTANT?” Mobile devices are the fastest growing consumer technology, with worldwide unit sales expected to increase from 300 million in 2010, to 650 million in 2012. Mobile applications are likewise booming. In June 2011, for the first time ever people on average spent more time using mobile applications (81 minutes) than … Read more

SIM

A SIM card orSubscriber Identity Module is a portable memory chip used in some models of cellular telephones. The SIM card makes it easy to switch to a new phone by simply sliding the SIM out of the old phone and into the new one. The SIM holds personal identity information, cell phone number, phone … Read more

PROTOCOLS USED IN MOBILE

The Main Protocols used by Mobile Phones: SMS EMS MMS WAP. INTRODUCTION TO SMS MESSAGING- SMS stands for Short Message Service. It is a technology that enables the sending and receiving of messages between mobile phones. SMS first appeared in Europe in 1992. It was included in the GSM (Global System for Mobile Communications) standards … Read more

MOBILE PHONE STANDARDS

ADVANCED MOBILE PHONE SYSTEM (AMPS) Advanced Mobile Phone System (AMPS) was an analogmobile phone system standard developed by Bell Labs, and officially introduced in the Americas in 1983 and Australia in 1987. It was the primary analog mobile phone system in North America (and other locales) through the 1980s and into the 2000s. As of … Read more

MOBILE GENERATION

In 1895 a few years after invention of telephone, Marconi demonstrated the first radio based wireless transmission. The first radio based conversation was used in ships during 1915. The first public mobile telephone system known as Mobile Telephone System (MTS) was introduced in United States in 1946. AT&T Bell laboratories devised the cellular concept which … Read more