• CERTIFICATE
    • Eminent VARs of India
    • Best OEM 2023
  • SYNDICATION
    • AMD
    • DELL TECHNOLOGIES
    • HITACHI
    • LOGMEIN
    • MICROSOFT
    • RIVERBED
    • STORAGECRAFT
    • THALES
  • EVENTS
  • GO DIGITAL
  • INFOGRAPHICS
  • PRESS
    • Press Release PR News Wire
    • Press Release Business Wire
    • GlobeNewsWire
  • SPECIAL
    • WHITE PAPER
    • TECHNOMANIA
    • SME
    • SMART CITY
    • SERVICES
    • EDITOR SPEAK
    • CSR INITIATIVES
    • CHANNEL GURU
    • CHANNEL CHIEF
    • CASE STUDY
  • TECHTREND
    • VAR PANCHAYAT
    • TELECOM
    • SOFTWARE
    • POWER
    • PERIPHERALS
    • NETWORKING
    • LTE
    • CHANNEL BUZZ
    • ASK AN EXPERT
  • SUBSCRIBE
  • Apps
  • Gaming
  • KDS
  • Security
  • Telecom
  • WFH
  • Subscriber to Newsletter
  • April Issue
  • Blogs
  • Vlogs
  • Faceoff AI
    

HOME
NEWS

Mobile Hacking Incident


By VARINDIA - 2018-04-24
Mobile Hacking Incident

By Col. K K Chaudhary
Executive Director-IT & IS – Lanco Group


A young lady, fresher from a famous Management Institute, visited my office recently in connection with a business opportunity for her company. Like good Business Development Executives, she had already done the homework of knowing about me from LinkedIn and other social media pages. She was aware about my blogs and on a personal note she wanted an advice on the ordeals that she was subjected to recently. 


The Mobile Hacking Incident that she explained is very alarming but common. All of us can face situation such as stalking, banking fraud, cheating etc. if we are casual towards handing of our mobile devices.
 

The incident
The girl was travelling to her home for a Holi break by Shatabdi Express. The person sitting next to her was a young gentleman of about 30years of age, traveling to the same destination. The girl was busy listening to music using earphone and spent most of her time either napping or reading novel. During the travel the boy initiated talk many times, but with brief responses, the girl avoided. Most of the time the boy was busy on his laptop.


As they were about to reach their destination, the boy became little uneasy with his phone. He looked worried and turned towards the girl. Appearing to be in hurry, the boy said that he didn’t realise that his mobile got discharged and will take some time to charge. He had to talk to his father about his arrival and requested for her mobile to make a call to his father who was supposed to receive him at the station. The girl obliged.


The girl then got busy packing her bag. The boy seemed to be dialling some number and after trying a couple of times he finally spoke to someone. With thanks and sense of gratitude, the boy returned the mobile to her. They reached their destination.

 

The Ordeal after the Mobile Hacking Incident
Later in the day the girl finds a WhatsApp message from the boy with a wish to meet. The girl, unhappy with the surprise message, blocked the WhatsApp number. After few hours she gets an SMS with a request to unblock WhatApp and a proposal to meet. The girl ignored. She then gets a WhatApp message from another number with a couple of her photographs stored in her mobile. The boy appreciated her look and dress. The girl was frightened. This time she ignored. There were some incoming calls also, which the girl didn’t take.


Next day, the girl went to the local market with her mother. She was astonished to see the boy entering the store and waving at her. Quite upset, the girl asked her mother to return home immediately. She hurriedly removed the SIM from her mobile and started using her mother’s mobile.


The next day was even more frightening. She got a message on Facebook. Wondering how the boy could get her Facebook profile, she just ignored the message again.


Just a day before she met me, she was again terrified to find the boy near her office approaching her. She hurriedly went inside her office premises and shared the ordeal with her friend. When she checked her private email account later in the day, she had a mail from this boy. He was just pleading for a meeting as he ‘had developed too much liking for her’.


On advice of the friend, she decided to lodge a police complaint against the unknown person. She was not very sure about the effectiveness of this step and associated inconveniences that she could face. 


The next day when she visited me, she was still carrying the same mobile but with SIM borrowed from her friend and was still getting the WhatsApp messages.  Of course, she was not responding.

 

What Really Happened in the Mobile Hacking Incident?
It appears that while the boy was pretending to be dialling a number, he actually used the mobile Internet to connect to his laptop/server to pull a Trojan into the mobile.


With a Trojan successfully installed into the mobile, the boy was able to capture all text messages, call details, Facebook profile, email addresses, media files including photographs and video stored in the mobile. He also has access to her locations as she had kept the GPS and location enabled in her mobile.
In a nutshell, the boy knew almost everything about her, including her family, friends, hobby, movements etc.


So many stalking incidents in recent days correlate with this incident as to how the stalker knows where the victim is!
 

Protection from Mobile Hacking Incidents
Most of us possess a mobile and are always connected to the Internet. We ignore the fact that the mobile has become our identity. It has our precious private data such as calls made, messages sent, photographs clicked and saved. With control on this device everything including our movements can be tracked.
The following precautions can save us from such ordeals -


•    Don’t Let your precious mobile go in unknown hands - This is the first lesson from the above incident. Our mobile is our most valuable possession, probably more valuable than our purse! If there was such a situation, the girl should have dialled the number herself and preferably put it in speaker mode. After all he wanted to speak to his father. In any case a one-time NO is less difficult than later sufferings.


•    Enable Screen Lock - Don’t use a PIN code for locking the screen. That’s the easiest one to breach, someone just has to be peeking while you unlock your phone. Using a complicated pattern is a better choice. While choosing this option, deactivate the option that makes it visible when you enter it. However, this protection has no effect if the SIM is removed and used in other phone. For this additional protection, you should consider setting PIN to SIM also.


•    Turn off automatic Bluetooth connectivity - Bluetooth on your mobile phone may be useful in the car or at home, where it’s safe to communicate with your other electronic devices. But if you are in a public place and the Bluetooth connectivity is left open, anyone sitting within the range of Bluetooth can pick up that signal and gain access to your phone. 


•    Mind your App -Free Apps are popular amongst youngsters. Please understand that the developers have spent time and money to develop them. They don’t offer it free to you. Instead they force you to allow them to access your data while you install it. They actually sell it to data brokers or hackers. 


•    Avoid Using Public Wi-Fi - Though Public Wi-Fi is free and saves you from exceeding your data limits, it is highly insecure. A good way to secure your information on public Wi-Fi is to use a virtual private network, or VPN that encrypt the data that enters and leaves your Wi-Fi connected device, encoding your sensitive information.


•    Deactivate Your Internet Exposure - If you get trapped, two quick actions that you must take – Lodge a complaint with Cyber Crime Dept. of police and deactivate all your Internet exposure for at least 3 months. This includes stoppage of use of the SIM and the mobile device. Use another device with different SIM. 

 

See What’s Next in Tech With the Fast Forward Newsletter

SECURITY
View All
Zscaler announces AI innovations to its Data Protection Platform
Technology

Zscaler announces AI innovations to its Data Protection Platform

by VARINDIA 2024-05-20
SHIELD to enhance Swiggy’s fraud prevention and detection capabilities
Technology

SHIELD to enhance Swiggy’s fraud prevention and detection capabilities

by VARINDIA 2024-05-20
Axis Communications announces its first thermometric camera designed for Zone/Division 2
Technology

Axis Communications announces its first thermometric camera designed for Zone/Division 2

by VARINDIA 2024-05-20
SOFTWARE
View All
Hitachi Vantara and Veeam announce Global Strategic Alliance
Technology

Hitachi Vantara and Veeam announce Global Strategic Alliance

by VARINDIA 2024-05-16
Adobe launches Acrobat AI Assistant for the Enterprise
Technology

Adobe launches Acrobat AI Assistant for the Enterprise

by VARINDIA 2024-05-11
Oracle Database 23ai offers the power of AI to Enterprise Data and Applications
Technology

Oracle Database 23ai offers the power of AI to Enterprise Data and Applications

by VARINDIA 2024-05-10
START - UP
View All
Data Subject Access Request is an integrated module within ID-REDACT®
Technology

Data Subject Access Request is an integrated module within ID-REDACT®

by VARINDIA 2024-04-30
SiMa.ai Secures $70M Funds from Maverick Capital
Technology

SiMa.ai Secures $70M Funds from Maverick Capital

by VARINDIA 2024-04-05
Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure
Technology

Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure

by VARINDIA 2024-02-08

Tweets From @varindiamag

Nothing to see here - yet

When they Tweet, their Tweets will show up here.

CIO - SPEAK
Automation has the potential to greatly improve efficiency and production

Automation has the potential to greatly improve efficiency and production

by VARINDIA
Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

by VARINDIA
Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

by VARINDIA
Start-Up and Unicorn Ecosystem
GoDaddy harnesses AI power for new domain name recommendations

GoDaddy harnesses AI power for new domain name recommendations

by VARINDIA
UAE’s du Telecom selects STL as a strategic fibre partner

UAE’s du Telecom selects STL as a strategic fibre partner

by VARINDIA
JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

by VARINDIA
Rapyder partners with AWS to accelerate Generative AI led innovation

Rapyder partners with AWS to accelerate Generative AI led innovation

by VARINDIA
ManageEngine integrates its SIEM solution with Constella Intelligence

ManageEngine integrates its SIEM solution with Constella Intelligence

by VARINDIA
Elastic replaces traditional SIEM game with AI-driven security analytics

Elastic replaces traditional SIEM game with AI-driven security analytics

by VARINDIA
Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

by VARINDIA
Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

by VARINDIA
Dassault Systèmes to accelerate EV charging infrastructure development in India

Dassault Systèmes to accelerate EV charging infrastructure development in India

by VARINDIA
Tech Mahindra and Atento to deliver GenAI powered business transformation services

Tech Mahindra and Atento to deliver GenAI powered business transformation services

by VARINDIA
×

Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.

  • Distributors & VADs
  • Industry Associations
  • Telco's in India
  • Indian Global Leaders
  • Edit Calendar
  • About Us
  • Advertise Us
  • Contact Us
  • Disclaimer
  • Privacy Statement
  • Sitemap

Copyright varindia.com @1999-2024 - All rights reserved.