View
69
Download
3
Category
Preview:
Citation preview
Cyber Crime (Mobile Phone Data
Hacking)
Presented by Md Abu Syeem
Introduction
Threat types
Threat description
Conclusion
Q/A
Agenda
smartphone
a mobile phone that performs many of the functions of a computer, typically having a touchscreen interface, Internet access, an operating system capable of running downloaded apps and storage
All major cellular networks support
• Voice calls• Voice mail (VM)• Short Message Service (SMS)• Location-based Services (LBS)• IP Connectivity
Circuit Switching-Paging effect Packet Switching-GGSN(Gateway GPRS support node) SGSN(Serving GPRS support node) (CDR-Call Detail Record)
Communication Attack
Bluetooth Attack1.Bluesnarfing2.Bluebugging3. Blue jacking4.DOS AttackWi-fi:Packet sniffing NFC:Near field communication
• Apps get permission to do questionable things– Access your Address Book– Access your location– Make calls/Send SMS
• Apple vs. Android– Less of an issue for Apple
•Strong requirements to get into app store Doesn't mitigate risk entirely
– Android is a bigger risk•Play Store is more openPeople don’t always read app permissions or
understand them
Physical Attack
Sim cloneDock connectorlockscreenstole
QR code
Q/A
Recommended