Spyphones as a Political Espionage Tool

 
Just recently high-ranking Georgian officials were accused of hacking into their political opponents’ computers and phone call tapping - recordings that were later uploaded to YouTube. With the prevalence of mobile phones, phone call tapping stepped up a notch - moving from bulky hardware to undetected spyphone software. With a wide range of capabilities such as grabbing contact lists, emails, phone recordings and text messages - these spyphones are the favorite surveillance choice of adversaries. For political opponents such a device compromise could be devastating. From losing out on an upcoming election to spilling country secrets. ...

Pwned: How can I prevent my iPhone from being hacked?

 
Following our last blog entry, we were inundated by personal requests asking us: How do iOS devices (iPhone, iPod) become infected with spyphone malware? And more pressing, how to prevent a spyphone installation? How are iOS devices hacked? In order the install the spyphone software, the attacker first needs to jailbreak the device. Jailbreaking methods are constantly changing. For past iOS versions, it was as easy as clicking a PDF - in which case the attacker did not need physical access to the device. And although this could be done by sending an email with a link, it could even be performed by simply ...

MythBusters – is iOS Hack-Proof?

 
At Lacoon Security we sleep, breathe and live mobile security. But one question we keep receiving is whether iPhones are in fact hack-proof. After all, when you hear about malicious apps - such as those that send text messages to premium numbers- most likely you hear about them in context of Android’s Marketplace. Apple’s tight app approval procedure, in this case, seems to be some sort of safety net. We looked at it differently. What about more focused attacks, those that are infected by surveillance software unknowingly planted on the victim’s device – namely, spyphones? Our findings were startling. Not only ...