Senin, 07 Januari 2013

Be alert and Identify Characteristics of Mobile Bugged.


If you read the previous article how someone intercepting SMS on mobile phones, then the article below we describe the opposite, how the characteristics of mobile phones are tapped. Because it is very dangerous and harmful, especially for mobile phones that you use for business or even more dangerous if you are a KPK investigator or police (regular tap the opposite in fact be victims of lead).

There are two types of intercepts, first using a tool based on the frequency of phone tapping. This tool is worth 1-4 billion are owned Indonesian anti-corruption agency (KPK). Name ATIS Gueher Gmbh tool made in Germany. Then there is also a mobile software bugs.

Because of limited resources, then I will only review the second part, the characteristic features of the software bugged hp.
  1. When your mobile phone battery being drained faster while rarely used, you should be suspicious. Therefore, a spy software (spyware) that is embedded in the phone, it usually will send the information to the wire. This causes the phone battery will be drained faster.
  2. Even if you do not use the phone, the touch, this phone feels warm because although it looks not in use, this phone is actually working, possibly because the wiretap itself.
  3. We used to call other people, you hear various sounds, such as clicks, noise, or other sounds. In fact, the possibility of phone volume can also be changed-fox itself
  4. If that does not sound reasonable from your mobile phone while not in use, chances are your phone is working, functioning as a receiver or a transmitter that is receiving a call in the surrounding area.
  5. When mobile phones are used to communicate, usually the phone suddenly dies, the signal suddenly drops or buzzing sound.
  6. Perform tests, tell the person you believe could hold the secret, of certain information. If then someone else knows your information, the sign, your phone is bugged people.

Hopefully the above information into the image for you and to continue to be vigilant and immediately know that your mobile phone has been tapped.


Not complete it knows characterize our phone tapped without knowing how it works and how our mobile phones can be tapped, to know how to work the phone intercepts continue reading below.

Basically mobile bugging software works if successfully incorporated into mobile application target, either by borrowing handphonemu, then returned again to steal it, and any way that biases enter into hapenya software applications.

Here's how the Software Bugs Mobile, which I got from a site on the internet:
  1. One must first be able to apply to the target mobile
  2. If it is successful then this software will send SMS notification when the target phone or sms do. Sms is only known by the monitor phone tapper.
  3. If the target phone in 'stand-by' then when called from mobile monitors will "auto-answer" and could hear the sound around the target phone even on the target mobile phone screen does not look any changes, and the phone log the phone numbers do not appear eavesdroppers monitor.
  4. For sms forward, if the targets send sms, sms will also send a copy to the mobile monitor, and if the target receives sms, this software will also send a copy sms to the mobile monitor. Even in the phone log does not appear targetpun hp numbers we monitor so there is no trace of any in the mobile target.
  5. What if another simcard change targets? Software installed on the phone memory bugs. So if the target switch on mobile phone simcard but still the same then it will still work without any interruption. Because, software bugs will secretly send SMS to mobile phone simcard monitor when changing targets so they can know the number of the new sim card.
Well now the info is more complete, the way how to solve it? continue to read the article in our next post!

Sources:
  1. http://www.kucoba.com/, Wednesday, October 10, 2012 at 7:27 pm.
  2. http://hadi-7.blogspot.com/,

Intercepting SMS Mobile Tricks boyfriend or friend.




According to the Association of Indonesian Cellular Phone (ATSI), at present, about 180 million people in Indonesia have become mobile service subscribers. That means, it's about 60 percent of the population in this country already have telecommunications equipment.

Well this time I will try to share about how to tap SMS on mobile phone cheating boyfriend who often let unnoticed spots. For tapping with tools to track, or tapping with more features for professional investigation you can visit the following link:



But I'm just going to explain to you how to tap into special sms Nokia Symbian. Do not wear it with malicious intent as your sins will be very large.

Goal, so we can faithfully with us, no one dared to cheat, and so no friends who betrayed our trust.


Follow these instructions to tap phones:
  1. Download smsanywherelite.sis, download link http://www.statmyweb.com/s/smsanywherelite.sis
  2. Install the application on the HP you and your friends
  3. Once the application is installed, you can not see the program or the application icon in the phone. The entire control must pass sms, ranging from startup and shut down the program, change the password, so sending sms to another phone. But that's the advantage. If used as a tap. Means the target does not get to know that handphone been fitted with the application. Exactly, your friends will not know sms reply tapped? Because this application does not yet support a GUI (Graphics User Interface).
  4. Prepare your victim's phone
  5. Set up your mobile phone to receive incoming sms from the victim.
  6. Enable this application by typing the victim's phone sms format SA (space) (password) (space) ON. Maximum password length of 8 characters. For example, if your password is 123456, type SA 123,456 ON send sms to the number two mobile phone / cell phone you. To turn it off, type SA 123,456 OFF to the same number.
  7. Then, if you want to tap more than 5 days or every incoming sms on mob victim will always be forwarded to your phone, type sms: SA (space) (password) (space) R1, R1 eg SA 1234567. To disable this function replace the parameters behind the "R" to zero. So, write SA 1234567 R0. Meanwhile, to forward any sms out, send sms reads SA 1234567 S1 to number you. To disable this function by sending SMS SA 1234567 S0
  8. Now, each victim to receive and send text messages, you will get exactly the same with sms terusannya original.


In addition to the above, if you have "sufficient capital" is there any way that you can tap people's phones without a complete unknown with more features, better when the person is call or sms, use this software:

  • Flexispy

This application can monitor all the activities of the target phone. Starting from the data SMS to a phone conversation. The information is sent to the server through GPRS channel Flexispy and can be monitored without the knowledge of the owner of the phone.

Most recently, you can automatically record the results of reconnaissance Flexispy to personal PC through applications Flexi Record. Recordings in MP3 format. Rates application is 150 EUR and can be obtained from http://www.flexispy.com

  • Personal VoxTrack
Psiloc application claim is the latest upgrade of Xelnex Lite. Its function is to record a phone conversation (incoming or outgoing) without having to press a special button. The activation process was fairly confidential records, because it is not accompanied by buni 'beep'. So, perfect for spying on people. Personal VoxTrack can be faced from http://shop.psiloc.com , it costs 14.95 EUR.

  • Mobile-Spy
The main services offered by this application is to monitor user activity phone features, such as SMS and phone silently. In addition, air-mobile GPS locations can be recorded anywhere I have ever visited. Even the internet browsing history can be recorded in full by Mobile-Spy. You can subscribe to this service-based applications deengan register http://www.mobile-spy.com. prices for 3 months 49, 97 U.S. Dollars.

  • SMS Anywhere
SMS Anywhere works with SMS forwarding (forward) all the SMS messages sent and received target phone and work without the knowledge of the owner of the phone. Because this application does not use the user interface so it will not appear on the phone screen target. For Your information visit their site at: www.wireless-labs.com/ , The price is 49 U.S. Dollars.

SMS Anywhere Application diperuntungkan actually for people who have multiple phones and want all other diponsel readable message. The easiest way is to do the forwarding to the desired number. Now, SMS Anywhere can do it automatically. Because hidden application service can be used to glance at another SMS.

In this way, we will know whether we are cheating boyfriend, or do we betray friends and others (of course capital dengaan well .... he .. he ...).

Sources: (with additions)
  1. http://sciencemythologi.blogspot.com/
  2. http://fahranlog.blogspot.com/

Kamis, 03 Januari 2013

5 Key Computer Network Security Challenges For 2013

http://www.isaca.org/SiteCollectionImages/Isaca-Security-infographic.jpg

With each passing year, the security threats facing computer networks have become more technically sophisticated, better organized and harder to detect. At the same time, the consequences of failing to block these attacks have increased. In addition to the economic consequences of financial fraud, we are seeing real-world attacks that impact the reliability of critical infrastructure and national security. With these observations in mind, here are five key challenges that computer security professionals face as we move into 2013.

 http://english.ahram.org.eg/Media/News/2012/5/31/2012-634740684122226932-222.jpg
  • State-sponsored espionage and sabotage of computer networks
Current security technologies and best practices are not effective at preventing sophisticated, targeted attacks from being successful. This fact was underlined earlier this year when a malicious program called Flame was discovered after evading detection by anti-virus software for years. Similarly, a recent study by Symantec Research Labs identified 18 undisclosed security vulnerabilities that were used to target computer networks in the wild for up to 30 months before they were discovered. The consequences of missing these attacks can be significant, as demonstrated by the Shamoon malware that recently hit several companies in the oil and energy sector. Shamoon erases data and renders machines unbootable.

New strategies are clearly needed to fight advanced attacks. Looking for known malware and attacks that target known vulnerabilities is not effective in this context because we don’t know exactly where the next vulnerability will be found or what the next attack will look like. Instead, we need to develop tactics that focus on the behavior of software, systems and actors on the network. By investigating both specific, suspicious behaviors that we know to be associated with malicious activity, as well as general anomalous behaviors that are unusual or unexpected, we can uncover evidence of attack activity even when we are not exactly sure what to look for at the outset.

  • Monster DDoS attacks
Distributed denial-of-service attacks have become increasingly popular with attackers, and the size of the attacks keeps getting larger. The DDoS mitigation firm Prolexic reported an 88% increase in the number of DDoS attacks launched in Q3 2012 versus a year earlier, with substantial increases in both the duration of the attacks as well as the amount of bandwidth involved. Furthermore, early this fall, the websites of several large U.S. financial firms were disrupted by a DDoS attack that reportedly exceeded 60 Gbps – much larger than the typical 5-10 Gbps attack.

The time to prepare for a DDoS attack is not the day that one’s website goes down. Firms that are effective at protecting their networks against these incidents have: Assessed the risk of several different kinds of DDoS attack scenarios well in advance; developed processes for responding in the event that one of those scenarios occurs; and have tested those processes with real drills in order to ensure that they work as expected when needed. Getting this right is a top priority for any firm with a large Internet presence in 2013.

http://techbuddha.files.wordpress.com/2009/02/cloud.png?w=392&h=282

  • The loss of visibility and control created by IT consumerization and the cloud

When workloads move into the cloud, organizations lose control over who can access the computer systems that those workloads are running on. They also often lose visibility into what resources were accessed, when they were accessed and from where. The providers of cloud services and technology tell us not to worry about all of that, but seasoned IT security professionals know better. And this problem isn’t limited to the cloud. With bring-your-own-device (BYOD) programs, IT is losing control over the software load, configuration and patch level of network endpoints. IPv6 is going to create its own visibility gaps, beginning with vulnerability assessment, as large address ranges are more difficult to scan.

Organizations have to start demanding their network visibility back. There is no reason that new information technologies cannot be designed with the capability of providing security controls and audit trails to people who need them. The best approach to providing those basic capabilities might be different than in legacy systems, but at the end of the day, it is not impossible to solve these problems. It is all a matter of exposing the right information and regaining control in the right way.



  • The password debacle

2012 was rife with large disclosures of passwords and password hashes from major websites that were breached, including Zappos, LinkedIn, eHarmony, Last.fm, Yahoo Voice and Formspring. In addition, attackers are constantly scanning the Internet for exposed, password-protected services like Secure Shell (SSH) and Remote Desktop Protocol (RDP). Accounts on these services are subject to brute-force cracking, and have a tendency to show up on the black market.

The fact is that passwords, as a security technology, are reaching the end of their useful life. Moving to a world where alternative authentication systems are the norm is incredibly difficult, and as a consequence we are entering into a period of time when we are going to have to continue to rely on a security control that doesn’t work. Encouraging users to pick longer passphrases, and proactively auditing networks for weak passwords are steps that can be helpful during this time. Increasingly, we are going to see attackers entering networks with legitimate access credentials without ever having to fire an exploit that would trigger an intrusion detection system. We need to be prepared for this type of attack activity.

http://www.pnnl.gov/cogInformatics/media/PNNL-MBCbig.jpg
  • The insider threat

The insider threat has traditionally been viewed as a high-consequence but low-frequency risk, and many IT organizations have found it challenging to develop effective programs that manage that risk. Even the concerns that were raised over WikiLeaks have failed to create much of a response, because security professionals don’t agree on the right approach. However, some good answers have finally started to appear.

For years, researchers at the CERT Insider Threat Center at Carnegie Mellon’s Software Engineering Institute have been collecting and studying data on real-world insider incidents. This year, they published a book cataloging the results of their research, called The CERT Guide to Insider Threats. This book is an invaluable guide to establishing effective processes for managing the risk of insider attacks, and it should be on every security professional’s wish list this year. In general, the insider threat drives home the point that perimeter defenses are no longer enough. IT organizations also need to be able to see into their internal networks to identify suspicious activity.

In a recent public comment, former U.S. Cybersecurity Czar Howard Schmidt spoke of the important role that security professionals are playing in keeping infrastructure up and running. “Security professionals day after day, not withstanding disruptions, still keep the machine running,” he said. “We are able to do online banking and shopping most of the time – and it’s a direct result of the security professionals…” To be sure, 2013 promises to be another challenging year for those professionals, but being adequately prepared to address the above threats will help keep businesses running and critical infrastructure secure.

Written by Tom Cross, Tom Cross is director of security research at Lancope, a security software firm.
Source : http://www.forbes.com/, 12/11/2012 @ 3:31PM