November 28, 2020

Protecting a Cellphone Against Hackers

And while Mr. Bokath’s job is to expose security flaws in wireless devices, he said it was “trivial” to hack into a cellphone. Indeed, the instructions on how to do it are available online (the link most certainly will not be provided here). “It’s actually quite frightening,” said Mr. Bokath. “Most people have no idea how vulnerable they are when they use their cellphones.”

Technology experts expect breached, infiltrated or otherwise compromised cellphones to be the scourge of 2012. The smartphone security company Lookout Inc. estimates that more than a million phones worldwide have already been affected. But there are ways to reduce the likelihood of getting hacked — whether by a jealous ex or Russian crime syndicate — or at least minimize the damage should you fall prey.

As cellphones have gotten smarter, they have become less like phones and more like computers, and thus susceptible to hacking. But unlike desktop or even most laptop computers, cellphones are almost always on hand, and are often loaded with even more personal information. So an undefended or carelessly operated phone can result in a breathtaking invasion of individual privacy as well as the potential for data corruption and outright theft.

“Individuals can have a significant impact in protecting themselves from the kind of fraud and cybercrimes we’re starting to see in the mobile space,” said Paul N. Smocer, the president of Bits, the technology policy division of the Financial Services Roundtable, an industry association of more than 100 financial institutions.

Cellphones can be hacked in several ways. A so-called man-in-the-middle attack, Mr. Bokath’s specialty, is when someone hacks into a phone’s operating system and reroutes data to make a pit stop at a snooping third party before sending it on to its destination.

That means the hacker can listen to your calls, read your text messages, follow your Internet browsing activity and keystrokes and pinpoint your geographical location. A sophisticated perpetrator of a man-in-the-middle attack can even instruct your phone to transmit audio and video when your phone is turned off so intimate encounters and sensitive business negotiations essentially become broadcast news.

How do you protect yourself? Yanking out your phone’s battery is about the only way to interrupt the flow of information if you suspect you are already under surveillance. As for prevention, a common ruse for making a man-in-the middle attack is to send the target a text message that claims to be from his or her cell service provider asking for permission to “reprovision” or otherwise reconfigure the phone’s settings due to a network outage or other problem. Don’t click “O.K.” Call your carrier to see if the message is bogus.

For added security, Mr. Bokath uses a prepaid subscriber identity module, or SIM, card, which he throws away after using up the line of credit. A SIM card digitally identifies the cellphone’s user, not only to the cellphone provider but also to hackers. It can take several months for the cellphone registry to associate you with a new SIM. So regularly changing the SIM card, even if you have a contract, will make you harder to target. They are not expensive (about $25 for 50 of them on eBay). This tactic works only if your phone is from ATT or T-Mobile, which support SIM cards. Verizon and Sprint do not. Another way hackers can take over your phone is by embedding malware, or malicious software, in an app. When you download the app, the malware gets to work corrupting your system and stealing your data. Or the app might just be poorly designed, allowing hackers to exploit a security deficiency and insert malware on your phone when you visit a dodgy Web site or perhaps click on nefarious attachments or links in e-mails. Again, treat your cellphone as you would a computer. If it’s unlikely Aunt Beatrice texted or e-mailed you a link to “Great deals on Viagra!”, don’t click on it.

Since apps are a likely vector for malware transmission on smartphones, Roman Schlegel, a computer scientist at City University of Hong Kong who specializes in mobile security threats, advised, “Only buy apps from a well-known vendor like Google or Apple, not some lonely developer.”

It’s also a good idea to read the “permissions” that apps required before downloading them. “Be sure the permissions requested make sense,” Mr. Schlegel said. “Does it make sense for an alarm clock app to want permission to record audio? Probably not.” Be especially wary of apps that want permission to make phone calls, connect to the Internet or reveal your identity and location.

The Google Android Market, Microsoft Windows Phone Marketplace, Research in Motion BlackBerry App World and Appstore for Android on Amazon.com all disclose the permissions of apps they sell. The Apple iTunes App Store does not, because Apple says it vets all the apps in its store.

Also avoid free unofficial versions of popular apps, say, Angry Birds or Fruit Ninja. They often have malware hidden in the code. Do, however, download an antivirus app like Lookout, Norton and AVG. Some are free. Just know that security apps screen only for viruses, worms, Trojans and other malware that are already in circulation. They are always playing catch-up to hackers who are continually developing new kinds of malware. That’s why it’s important to promptly download security updates, not only from app developers but also from your cellphone provider.

Clues that you might have already been infected include delayed receipt of e-mails and texts, sluggish performance while surfing the Internet and shorter battery life. Also look for unexplained charges on your cellphone bill.

As a general rule it is safer to use a 3G network than public Wi-Fi. Using Wi-Fi in a Starbucks or airport, for example, leaves you open to hackers shooting the equivalent of “gossamer threads into your phone, which they use to reel in your data,” said Martin H. Singer, chief executive of Pctel, a company in Bloomingdale, Ill., that provides wireless security services to government and industry.

If that creepy image tips you into the realm of paranoia, there are supersecure smartphones like the Sectéra Edge by General Dynamics, which was commissioned by the Defense Department for use by soldiers and spies. Today, the phone is available for $3,000 only to those working for government-sponsored entities, but it’s rumored that the company is working to provide something similar to the public in the near future. General Dynamics did not wish to comment.

Georgia Tech Research Institute is taking a different tack by developing software add-on solutions to make commercially available phones as locked-down as those used by government agents.

Michael Pearce, a mobile security consultant with Neohapsis in Chicago, said you probably did not need to go as far as buying a spy phone, but you should take precautions. “It’s like any arms race,” he said. “No one wins, but you have to go ahead and fight anyway.”

Article source: http://feeds.nytimes.com/click.phdo?i=faaa26d420b15bb6f03089bb0ff337a1

Bucks Blog: Tuesday Reading: Public Workers Retiring Earlier in Tight Times

December 06

Tuesday Reading: Public Workers Retiring Earlier in Tight Times

Public workers retiring early in tight times, next-day mail service faces cuts, bad behavior when talking to cellphones and other consumer-focused news from The New York Times.

Article source: http://feeds.nytimes.com/click.phdo?i=152ff8cda3bd3f02b181f74dd5e5401e

Foreclosure Protesters in Spain’s Cities Now Go Door to Door

“It was a day that for many people would have been depressing,” Ms. del Coto said afterward. “But for me it turned out to be a day of privilege. I met all these marvelous people. And I was very grateful.”

The young demonstrators who camped out by the thousands in Spain’s major city squares for much of May and June, protesting government corruption and an economy that has left them jobless, have mostly gone home.

But the movement has produced an army of volunteers who are making their presence felt in the tangled world of Spain’s foreclosure system — perhaps the harshest in Europe — which usually leaves former homeowners in debt for the rest of their lives.

Organizing the protest in front of Ms. del Coto’s modest home was Eloi Morte, 28, who was juggling several cellphones. Mr. Morte, a flight attendant, decided to help block evictions after he attended a neighborhood meeting organized by the protesters who had occupied the Puerta del Sol, the city’s central square.

“This was something very concrete that I could do,” he said. “I wanted to see results, not just vague protests against the financial establishment, the banks. I wanted to do something constructive.”

Spain, like the United States, experienced a huge housing boom that came to a crashing halt in 2008. As the economy stalled, unemployment rates soared to the highest in the European Union, hovering at 40 percent for young people — who until recently seemed apathetic. That changed on May 15, when young people began congregating across the country in peaceful protests that lasted weeks in some cities.

Now some of those protesters are using their Internet savvy to gather crowds on behalf of beleaguered homeowners. Hundreds of protesters are showing up at threatened evictions like Ms. del Coto’s. They are getting press coverage as never before — and, some say, results.

Since June, about 30 evictions have been blocked, according to a nonprofit housing advocacy group known by its initials, P.A.H. — more than twice the rate than before. And eviction protests are taking place in more cities.

This month, the government and the opposition in Parliament, no doubt looking toward elections next year, issued statements saying they would overhaul the foreclosure laws.

“We are proud that today our demands have become a popular clamor,” said Ada Colau, a human rights lawyer with P.A.H. “This has forced the government to react, despite the pressure from the banks.”

When Spanish mortgage debtors cannot make their payments, Spanish law denies them two ways out that are common elsewhere: they cannot simply hand the keys back to the bank and walk away, and they cannot discharge their debt in bankruptcy. They remain personally liable for the full amount of the loan after foreclosure, and when penalty and interest charges and tens of thousands of dollars in court fees are counted, they can end up on the street facing a mountain of debt.

Housing advocates would like to see Spain move to a system that more resembles that of the United States. But the new proposals do not go nearly that far. Most are meant only to ease the current conditions. For instance, banks would still be allowed to take a percentage of a debtor’s salary, but not quite so large a percentage. Similarly, if no one appears at a foreclosure auction and the bank buys the property itself, it will have to pay 60 percent of market value, up from 50 percent under current law.

Still, housing advocates say the proposals are a start.

Santos González Sánchez, the president of a lender’s trade group, the Spanish Mortgage Association, says some of the proposals are not well thought out and that the issues need further study. He dismisses the protesters as “more anecdotal than effective.”

There were about 94,000 foreclosures in Spain last year, nearly four times the number for 2007. It can take more than a year to evict the occupants after a foreclosure, and banks sometimes agree to lease the homes back to their former owners.

The excesses in real estate and banking here were profound, with banks lending at an astonishing pace, often to customers who were poor risks and did not understand the fine print. People who signed mortgages as guarantors were often surprised to realize that they could lose everything they owned.

Ms. del Coto guaranteed a loan for a partner who has since left her and her children, including a disabled 26-year-old son who fell from a window as a toddler. She said she was looking for work as a maid again, but had not found any. Nor does she have a place to move if she is turned out of the tidy home she has been in for 25 years.

The protests block the evictions only temporarily. Advocates say that when the police and other officials involved in the eviction see the crowds, they usually walk away. It takes at least a month to organize another eviction effort, they said, and sometimes much longer.

Mr. Morte said the protesters hoped that in the meantime the bank would be persuaded to rent the house to Ms. del Coto at a price she could afford.

“That is our hope with all of these protests,” he said, “that a negotiation can keep people from being put out on the street.”

Rachel Chaundler contributed reporting.

Article source: http://www.nytimes.com/2011/07/16/world/europe/16spain.html?partner=rss&emc=rss

Bucks: Tuesday Reading: A Closer Look At The Data On Cellphones And Cancer

June 07

Tuesday Reading: A Closer Look At The Data On Cellphones And Cancer

A closer look at data on cellphones and cancer, teens face greater crash risk in summer, Apple unveils cloud music and storage service and other consumer-focused news from The New York Times.

Article source: http://feeds.nytimes.com/click.phdo?i=cef91e193006713037de0add3ee212ee

Bucks: Wednesday Reading: Possible Link Between Cellphones and Cancer

June 01

Wednesday Reading: Possible Link Between Cellphones and Cancer

W.H.O. finds possible link between cellphones and cancer, bottom may be near in housing slide, tastier gluten-free options and other consumer-focused news from The New York Times.

Article source: http://feeds.nytimes.com/click.phdo?i=9aba365d53716cf9e24cae385a9fbebc