ALL >> Computers >> View Article
Mobile Phone Security Will Become A Major Threat If The Security And Privacy Of Smart Phones Are Not
Recent mobile phone hacking scandal has throwned a spotlight on mobile security.It is estimated that the potential victims of the phone hacking ran to thousands, and involved government ministers, police and defense chiefs.
Charlotte Harris, who is representing several of the celebrities involved, said 7,000 people may have had their mobile phone voicemail messages intercepted by The News of the World. It is reported that the hacking took place between 2004 and 2006.
Last week, News International,which publishes the News of the World, apologized for voicemail messages left on mobile phones being hacked on behalf of the News of the World. News International said it had approached another nine people who claimed to be victims of phone hacking, asking them for more evidence. One person familiar with the situation said the nine included Steve Coogan, the comedian, Leslie Ash, the actress, and Paul Gascoigne, the former footballer, ex-member of parliament George Galloway, and actor Jude Law's personal assistant Ben Jackson.
Now the scope of the scandal has expanded. At least 24 people who claim they are victims ...
... in the phone hacking affair have initiated civil cases against News International, which is expected to pay millions of pounds in compensation.
The media conglomerate, owned by Rupert Murdoch, said in a statement that it would set up a fund to compensate those affected. That said, past behavior at the News of the World in relation to voicemail interception is a matter of genuine regret. It is now apparent that our previous inquiries failed to uncover important evidence and we acknowledge our actions then were not sufficiently robust.
News International has offered to pay compensation to eight public figures, including actress Sienna Miller and Tessa Jowell, the former Labour minister.
In a 2007 court case, Clive Goodman, the royal correspondent to the News of the World was jailed after he admitted hacking into the messages of model Elle MacPherson as well as members of the royal household. In January Andy Coulson, prime minister David Cameron's spokesman, stepped down amid speculation he had known about the hacking, despite denying that he was involved. Coulson was the editor of the News of the World newspaper in 2007 when Goodman and private investigator Glenn Mulcaire were sentenced to prison for hacking into voice mails of members of the royal family's staff.
The security and privacy of smart phones may not be very secure as the last couple of years smartphones have been under increasing attack. "The smartphone OS will become a major security target," said Android Security Leader Rich Cannings. Attackers can already hit millions of victims with a smartphone attack, and soon that number will be even larger. "Personally I think this will become an epiphany to malware authors," he said.
Cyber criminals generally steered clear of mobile devices because currently Microsoft's Windows operating system is the prime target of criminal attacks today. Security experts say that this is because mobile phones haven't traditionally stored a lot of sensitive data, and because there are so many different devices to attack, it's hard to create a single virus that can infect a large number of users.
Phone manufacturers or IT professionals working with these corporations need to do their part to keep these smart devises safe. One way to mitigate security breaches is with technical security training. Information security professionals can increase their information security knowledge and skills by embarking on highly technical and advanced training programs. EC-Council has launched the Center of a Advanced Security Training (CAST), to address the deficiency of highly technically skilled information security professionals.
CAST will provide advanced technical security training covering topics such as Advanced Penetration Testing, Digital Mobile Forensics, Advanced Application Security, Advanced Network Defense, and Cryptography. These highly technical and advanced information security training will be offered at all EC-Council hosted conferences and events, and through specially selected EC-Council Authorized Training Centers.
ABOUT EC-COUNCIL
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (CEH) course, Computer Hacking Forensics Investigator (CHFI) program, License Penetration Tester (LPT) program and various other information security training programs offered in over 60 countries around the globe. EC-Council has trained over 80,000 individuals in technical security training and certified more than 30,000 security professionals. EC-Council has launched the Center of Advanced Security Training (CAST), to address the deficiency in the lack of highly technically skilled information security professionals.
Add Comment
Computers Articles
1. Future-proof Your Legacy Systems With Expert Foxpro Migration Services By Tech GazebosAuthor: Tech Gazebos
2. Why Fortigate 40f And Fortigate 60f Are The Best Choices For Business Network Security
Author: Stacklink uk
3. Why Modern Facilities Rely On Environmental Monitoring And Remote Temperature Probes For Compliance And Control
Author: Chris Miller
4. Spark Matrix™: Autonomous Mobile Robots (amr)
Author: Umangp
5. Spark Matrix™: Ai Observability Solutions
Author: Umangp
6. The Future Of Asset Intelligence: How Iot And Rfid Are Transforming Modern Operations
Author: TrackerIoT
7. Your Partner For Reliable Dynamics 365 Solutions!
Author: brainbell10
8. Download Pst Splitter Software (windows) – Split Large Pst Safely
Author: vSoftware
9. Buy Epson Thermal Printer: What To Know
Author: pbs
10. Pst To Mbox Conversion Without Losing Email Headers
Author: vSoftware
11. How Telecom Custom Order Management Software Is Transforming Customer Experience In The Digital Era
Author: Kevin
12. How To Launch A Successful Food Delivery App In Usa
Author: swizajoy
13. Flexible & Affordable Desktop Rental Solutions For Businesses | Renton Technologies
Author: Renton Technologies
14. Importance Of Good Identity And Access Management System In 2026
Author: adlerconway
15. What Is Vapt? Guide To The Introductory Vulnerability Assessment And Penetration Testing
Author: Lorcam Securities






