Time
1 hour 1 minute
Difficulty
Beginner
CEU/CPE
1

Video Transcription

00:00
Welcome back to Mobile device security course. In previous lesson, you have seen wise so important to take care of security of your mobile device,
00:13
and in this video I'm going to talk about hacking different types of mobile devices. So what are the threats that you are exposed to?
00:22
So in this particular video, you will see the types of issues with mobile devices
00:28
and all the things related to hacking the mobile phone. So how does it usually get? Gets hacked? Of course, I will not cover every possible threat and technique. I will just mention the most important ones, ones that I usually met
00:46
on the daily bases in the world.
00:50
So let's talk about the tax on mobile devices. And the first thing is, Cannot doesn't have to be
00:58
an attack
01:00
so the West can be lost or stolen. So when it's stolen, yes, it's a kind of attack. It's it's a theft. And this theft can be,
01:08
uh, main, mainly directed to getting your phone
01:14
to be hacked because selling if you kept your I am me a number, or if you have any record of your phone
01:27
and it gets stolen, pretty much cannot be used again. So if you reported so, if it's your private, you go to police. If it's your company phone you you go to
01:41
your I T. And then you're reported. They have all the records of it,
01:46
and this device can easily be find later when it's connected to a network. So this absolutely makes no sense for somebody to steal it just to sell it as a stolen good.
01:57
So people usually try to steal your phone to get your data, or even they try to steal your phone for a certain period of time. So let's say to borrow it
02:07
and then they hack your phone, they do something with it, and then they return it, hoping that you haven't noticed that there's been gone.
02:17
For example, if you are
02:20
sitting in a public place and your phone is
02:23
in your bag or next to you and you're really reading a book or something and they find a way just to to get the hold of your phone for a certain period of time and then return it and you don't even know it's been stolen for for the time. But it's now hacked with something
02:44
so device can be hacked through mobile network. That is the second thing that can happen to your phone. And it's, uh, when When we're talking about mobile network, it's not actually hacking. It's more like eavesdropping or spying on your device. So basically
03:00
ah, somebody can can wiretap in the in the mobile network. And it can, for example, have control, have access to all text messages that you're sending. So s miss
03:15
messages on these. Ah, because these messages go on encrypted and there
03:23
fully visible to anybody that can tap into the Net mobile network.
03:29
Um,
03:30
eso. The other thing is that the West can be fooled to connect to fake mobile network tower or fake WiFi.
03:38
Eso uh,
03:43
there are things called i Masai catchers and these devices
03:50
just say I'm in mobile network tower and then your phone connects to it. So basically your phone will connect to the strongest signal that can receipt that it can receive.
04:02
So if somebody with Diamos eye catcher is
04:05
just next to you
04:08
and the mobile network is mobile, network Tower is not so close. Then there is quite a chance that
04:15
the signal from I am aside catcher will be stronger than the one from the tower, and your phone will automatically connect to it. So basically, all the traffic that you are sending from your phone data, traffic or calls
04:30
can be wired up through I'm a psychiatric.
04:33
Then the device can be infected with backdoor malware or spyware, and there are different methods off doing that. The best one for the cyber criminal is to get to your phone temporarily and just install something on it and then return it.
04:53
The fact that you have locked your phone with pass code or with
04:59
some some gesture doesn't help. So depending on the type of the phone of the type of operating system, it can take from a couple of minutes to couple of hours to break through
05:12
this
05:14
kind of protection, and then they can do with your phone whatever they want. Toe like it, it's you doing that.
05:21
And, of course, the threat that is there for every possible computing device that uses email is that you're the West can be infected. Ah, through phishing email
05:38
for those who don't know what the phishing emails, I suggest you look at my training on cyber he called
05:45
and user email security, but just makes things short here. It's a male that is supposed to look like a legitimate male coming from somebody you know or somebody you don't know. But you expect something like that to lend in your inbox,
06:00
and that male can contain malware in terms off just the body off the email, the text of the mail
06:10
or a zone attachment to the email that you will open or as a link, which you will click on and go to the malicious website.
06:23
So these are the types that off attacks that are directed at mobile devices, the most common ones. And what is also very important is that some of these attacks are not specifically
06:34
targeting. Like fishing is not specifically targeting mobile devices. But they are there, and you have to be aware of it.
06:47
So what are the specifics of hacking through a mobile phone?
06:53
So when you talk about my wife only way talked about wiretapping through mobile network, there is a protocol in Mobile never fall. That's a seven. It's a very old one,
07:06
not particularly secure, but it's not so easy to break into the protocol But if if it was several criminal can do it and finds a way to do it,
07:16
then they can basically pretend that they are the mobile network and any unencrypted traffic coming from your phone, they can listen to it.
07:30
The same thing is with the am aside, catcher.
07:32
Then they can intercept communication if you connect to a free WiFi that is compromised in some way.
07:42
Thea other thing that is specifically directed to free charges Toto Mobile phones are free charges that can be very dangerous if you use them without precautions.
07:55
And, of course, if they can get a hold of your phone or device, they can other phone. They can they can infected with backdoor or malware or spyware or something. And, of course, the phishing email that we mentioned so previous slide. You have seen the things that are specifically for some or all
08:13
well, well devices. This is just about mobile phones.
08:16
So how does it work with them? Free WiFi that you connect to.
08:24
You have your phone on your trying your in restaurant and you're connected to
08:28
WiFi of the place and then you're connected to the Internet. The problem is that in some cases it might happen that
08:39
this device that you're connecting to, which is usually just a router that sits in
08:45
in the public place,
08:48
is not that Julia router
08:50
and, uh,
08:52
But what can happen is that it's actually a PC
08:56
that is connected to Internet and has a WiFi that simulating that breast runoff public. Place my fight.
09:03
So when you connect to that,
09:07
let work
09:09
that PC can filter every traffic that is going from your phone
09:15
to the rest of the Internet
09:18
and record it, or even they can even find a way to insert some. Well, we're in your phone through the network. So, uh,
09:28
this is the reason why you should be very careful when
09:33
connect using public WiFi spots on, and we're going to talk about how to protect yourself further in during this course.
09:46
So in this video you have learned what type off hacks or attacks are directed at all mobile devices,
09:54
and what are the techniques that the cyber criminals are using
10:00
to get told off your mobile phone?
10:05
So in next lesson, we're going to talk about other mobile devices

Up Next

End User Mobile Security

This course should give you basic ideas on importance of mobile device security, what needs to be protected on mobile device, who should be responsible for mobile device security and what are basic thing you need to do in order to reach that goal.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor