Tagged: smartphones Toggle Comment Threads | Keyboard Shortcuts

  • jkabtech 8:17 pm on July 1, 2018 Permalink | Reply
    Tags: , , , , , smartphones   

    How to Protect Your Smartphone’s Data, and Avoid Being Hacked 

    The government hack of an iPhone used by a San Bernardino killer serves as a reminder that phones and other electronic devices aren’t impenetrable vaults.

    While most people aren’t targets of the NSA, FBI or a foreign government, hackers are looking to steal the financial and personal information of ordinary people. Your phone stores more than just selfies. Your email account on the phone, for instance, is a gateway to resetting banking and other sensitive passwords.

    Like washing your hands and brushing your teeth, a little “cyber hygiene” can go a long way toward preventing disaster.

    Lock your phone with a passcode
    Failing to do so is like leaving your front door unlocked.

    A four-digit passcode – and an accompanying self-destruct feature that might wipe a phone’s data after too many wrong guesses – stumped the FBI for weeks and forced them to bring in outside help. Using six digits makes a passcode 100 times harder to guess. And if you want to make it even harder, you can add letters and other characters to further increase the number of possible combinations. These are options on both iPhones and Android.

    The iPhone’s self-destruct feature is something you must turn on in the settings, under Touch ID & Passcode. Do so, and the phone wipes itself clean after 10 failed attempts. But the 10 attempts apply to your guesses, too, if you forget your passcode, or if your kids start randomly punching in numbers. Android has a similar feature.

    Both systems will also introduce waiting periods after several wrong guesses to make it tough to try all combos.

    Biometrics, such as fingerprint scanners, can act as a shortcut and make complex passcodes less of a pain.

    Use encryption
    Much to the FBI’s displeasure, iPhones running at least iOS 8 offer full-disk encryption by default. That means that the information stored on the phone can’t be extracted – by authorities or by hackers – and read on another computer. If the phone isn’t unlocked first, any information obtained would be scrambled and unreadable.

    With Android, however, you typically have to turn that on in the settings. Google’s policy requires many phones with the latest version of Android, including its own Nexus phones, to offer encryption by default. But, according to Google, only 2.3 percent of active Android devices currently are running that version.

    Set up device finders
    Find My iPhone isn’t just for finding your phone in the couch cushions.

    If your device disappears, you can put it in Lost Mode. That locks your screen with a passcode, if it isn’t already, and lets you display a custom message with a phone number to help you get it back.

    The app comes with iPhones, but you need to set it up before you lose your phone. Look for the Find iPhone app in the Extras folder.

    Meanwhile, Activation Lock makes it harder for thieves to sell your device. The phone becomes unusable – it can’t be reactivated – without knowing its Apple ID. The feature kicks in automatically on phones running at least iOS 7.

    If all else fails, you can remotely wipe the phone’s data. While your information will be lost, at least it won’t end up in the hands of a nefarious person.

    There isn’t anything comparable built into Android phones, but Google’s Android Device Manager app, along with a handful of others made by third parties, can be downloaded for free from the Google Play app store.

    Back up your phone
    If you do have to remotely wipe the phone’s data, it’s comforting to know that you won’t lose all your photos and other important data. It’s helpful, too, if your toddler dunks your phone in a glass of water.

    As mentioned before, apps such as Find My iPhone and Android Device Manager will allow you to do this, provided you set them up ahead of time.

    Keep your software up to date
    Software updates often contain fixes to known flaws that might give hackers a way into your device.

    On iPhones, Apple prompts you to get the update.

    It’s more complicated with Android because updates need to go through various phone manufacturers and wireless carriers first. But do install updates when asked.

    For the latest tech news and reviews, follow Gadgets 360 on Twitter, Facebook, and subscribe to our YouTube channel.

    Tags: Android, Apple, Encryption, Mobiles, Smartphones

    View the Original article

    Advertisements
     
  • jkabtech 12:17 pm on May 2, 2018 Permalink | Reply
    Tags: , , Pocket-Sized, , smartphones, Sprocket   

    HP Sprocket Pocket-Sized Printer for Smartphones Launched in India 

    Highlights The HP Sprocket is priced at Rs. 8,999 It will allow you to click instant pictures in 2×3 inch size HP Sprocket aims to make physical photo printing convenient

    Instant gratification is the key takeaway for the millennials and keeping this in mind, global PC and printing major HP on Wednesday launched Sprocket – a pocket-sized photo printer – in India for Rs. 8,999.

    The unique hand-held printer would allow you to print instant pictures (2×3-inch size) and share among friends. Users will need to download the Sprocket app from Google Play Store or Apple App Store on their smartphone, pair it with the printer, place specially-designed HP ZINK papers in the device, switch on Bluetooth, and can then print images.

    .embed-container

    View the Original article

     
  • jkabtech 12:17 pm on September 17, 2017 Permalink | Reply
    Tags: , Broadpwn, , smartphones, takeover   

    Broadpwn flaw allows for remote takeover of smartphones 

    Makes self-propagating malware possible.

    A vulnerability in Broadcomm’s wi-fi chips can be exploited to infect mobile devices with self-propagating malware, paving the way for mass attacks that don’t require any user intervention.

    Exodus Intelligence researcher Nitay Artenstein found the flaw, dubbed “Broadpwn”, in the Broadcomm BCM43xx wi-fi chipsets.

    They are the dominant choice for high-end smartphones, used in the likes of Samsung’s Galaxy S8, the Nexus 5 and 6 models made for Google, and all Apple iPhones after the iPhone 5, Artenstein noted.

    He discovered that the firmware for the Broadcomm chip is not encrypted, nor are there any integrity checks, making it relatively easy for attackers to reverse engineer the code and patch it.

    By exploiting 802.11 wi-fi protocol association process probe requests and a bug in Broadcomm’s implementation of the wireless multimedia (WMM) quality of service extension, Artenstein was able to write a proof of concept that can silently implant attacker code on vulnerable devices without any user interaction.

    The remote attack against the Broadcomm BCM43xx chipsets bypasses mitigations such as address space layout randomisation and code execution prevention, meaning it could be used to code self-propagating malware.

    These mitigations largely killed off the worms that were common throughout the early 2000s. The most recent self-propagating malware of this type was the Conficker worm of 2009.

    Artenstein decided to create such a network worm through Broadpwn, and testing in public showed plenty of vulnerable smartphones.

    “Running an Alfa wireless adapter on monitor mode for about an hour in a crowded urban area, we’ve sniffed hundreds of SSID names in probe request packets,” Artenstein wrote.

    “Of these, approximately 70 percent were using a Broadcom wi-fi chip. Even assuming moderate infection rates, the impact of a Broadpwn worm running for several days is potentially huge.”

    He warned that hacks through new attack surfaces like the Broadcomm chipset could resurrect network worms while also providing a backdoor into otherwise secure mobile operating systems.

    Both Apple and Google issued patches for the Broadpwn vulnerability this month.

    View the Original article

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel
%d bloggers like this: