# 1 -- Physical Access to the Phone -- Obviously, if a person can get physical access to a cell phone, even for a few seconds, it's game over. The person can clone it, place a remote spying tool on the phone or download the pictures and information directly to their own account.
#2 -- Hacking Email, Twitter and Apps -- Most celebrities are hacked through email, Twitter and other accounts that they use on their phones. This is what happened to Scarlett Johanson, Kreayshawn, Mila Kunis and Christina Aguillera, among others -- and it may also be the reason for the more recent hacks on Heather Morris and Christina Hendricks.
#3 -- Social Engineer the Phone Company -- In 2005, hackers stole nude pictures of Paris Hilton by getting access to her T-Mobile Sidekick II, a precursor to today's smartphones. How did they do it? They impersonated a T-Mobile support tech over the phone and tricked T-Mobile employees into giving them access to the carrier's intranet site that contained a list of user accounts, which allowed them to reset the password to her account and steal photos and contacts. Today, there's still a risk hackers could reset accounts or permissions by conning the phone company, but it's more likely they'll simply target a person's accounts directly online.
#4 -- Wi-Fi Spies -- Movie stars do a lot of traveling, and while they're roaming about they're often connecting their phones to open Wi-Fi networks -- whether it's at the airport, hotel or Starbucks. This puts them at greater risk of being hacked. Using public Wi-Fi puts all of your online accounts, Internet searches, emails and usernames/passwords out in the open where they can be read, copied and hacked by any person with moderate computer skills. In fact, there are special tools available online that do this.
#5 -- Spyware -- Stars who spend a lot of time using open Wi-Fi and chatting with friends or followers on social networks and clicking on shared links are also at risk of spyware. Spyware is malicious software that can infect your phone in order to record the things you type -- like usernames and passwords -- and it can also be used to steal items from your phone, like photos, contacts and banking data. "FakeToken" is one example of spyware that is currently being found on some Android phones. There's a good chance some celebrity phones have been infected by spyware.
More Tips
#2 -- Hacking Email, Twitter and Apps -- Most celebrities are hacked through email, Twitter and other accounts that they use on their phones. This is what happened to Scarlett Johanson, Kreayshawn, Mila Kunis and Christina Aguillera, among others -- and it may also be the reason for the more recent hacks on Heather Morris and Christina Hendricks.
#3 -- Social Engineer the Phone Company -- In 2005, hackers stole nude pictures of Paris Hilton by getting access to her T-Mobile Sidekick II, a precursor to today's smartphones. How did they do it? They impersonated a T-Mobile support tech over the phone and tricked T-Mobile employees into giving them access to the carrier's intranet site that contained a list of user accounts, which allowed them to reset the password to her account and steal photos and contacts. Today, there's still a risk hackers could reset accounts or permissions by conning the phone company, but it's more likely they'll simply target a person's accounts directly online.
#4 -- Wi-Fi Spies -- Movie stars do a lot of traveling, and while they're roaming about they're often connecting their phones to open Wi-Fi networks -- whether it's at the airport, hotel or Starbucks. This puts them at greater risk of being hacked. Using public Wi-Fi puts all of your online accounts, Internet searches, emails and usernames/passwords out in the open where they can be read, copied and hacked by any person with moderate computer skills. In fact, there are special tools available online that do this.
#5 -- Spyware -- Stars who spend a lot of time using open Wi-Fi and chatting with friends or followers on social networks and clicking on shared links are also at risk of spyware. Spyware is malicious software that can infect your phone in order to record the things you type -- like usernames and passwords -- and it can also be used to steal items from your phone, like photos, contacts and banking data. "FakeToken" is one example of spyware that is currently being found on some Android phones. There's a good chance some celebrity phones have been infected by spyware.
More Tips
impressed to view your blog codelion, i really like it and i am going to share with my friends, hope that they will like it..
ReplyDeletePlum