YouTube VideoWatch this video on YouTube. Caller ID Spoofing A system which masks the caller from its recipient by displaying a different phone number on the caller ID. Similar to e-mail spoofing which uses different e-mail address as a mask. Location Eavesdropping Commonly used in social medias like Facebook and Foursquare which allows location check-ins. Hackers may target checked in locations and eavesdrop the conversations. In a worst case scenario, a hacker may work with burglars after confirmation that the target is not home and the house is vacant. SMS Spoofing New hacking technology to mobile technology which allows the sender to replace his/her mobile number with alphanumeric text. SMS spoofing have legitimate uses but can cause great damage to the recipient. a. The recipient of the SMS spoofing my incur termination charges as if received from a foreign network b. The SMS spoofing may use a real subscriber's number incurring sending charges as if they were in a foreign country c. Recipients may complain about spamming and possibly deflects sending of messages unless repaired Malicious Software Still being used by hackers as a technique to break security and cause multiple illegal functions such as intercepting calls or sending information (SMS, emails and passwords) and then transmitting it to another device. Having security software installed increases protection to user's private information stored in the smartphone. Identity Stealing Apps are very popular in smartphones and users may have tens to thousands of this installed. Fake apps give hackers the opportunity to access and steal all sorts of information about the phone, messages and data. Security programs are highly encouraged to prevent malwares and apps but should only be downloaded from trusted sources. Pretexting or Blagging Act of creating invented scenario such impersonation to engage targeted victim to divulge information or perform actions unlikely to happen in ordinary circumstances. Data that can be divulged includes addresses, phone bills, bank statements and health records. Wireless Hijack Wireless devices are great ways for transferring data files and can also be used for hacking. Wi-Fi and Bluetooth are vulnerable to hacking which can expose personal information of the target. Cloning Phone cloning allows hackers to receive calls and messages of the original device once turned-off. It requires special kits and techniques; it is not easy but can be done. FlexiSpy and Phone Tapping Normally, landlines are hacked by physical connection through terminal boxes and cables. However, more modern methods use a software called FlexiSpy to eavesdrop messages and voice calls to a Web site which allows access to stored data. Although banned in some networks, it has been used by parents to monitor their kids' calls. Mobile Phone Tap Various software allow remote listening to all phone conversations which are picked up through broadcast signals. Hackers may find these software difficult to obtain but it definitely exist. Mobile Phone Pinging Pinging a cell phone traces what cell tower the device is in. It is used by an agency by triangulating the approximate location of the mobile phone. It is not open for public use but hackers can tap into it and GPS makes it more dangerous for it can be used to trace a mobile phone even the device is turned off. Original Source ibtimes: http://au.ibtimes.com/articles/4104...ds-cyber-hacking-smartphones.htm#.UMc6Q4PqkiE
most detective agency's will have it. Something like this : http://www.pibillwarner.com/2012/08/the-anonymous-group-threatens-to-shut.html or : http://www.undetectablecellspy.com/ Very S!CK crapp but well if you dont have any confidence in yourself and you have nothing better to do then chase past dreams.... *THiNK DiFFeReNT* HaVe a NiCe DaY
Yes, Those are some of the ways to hack devices, These days People are using cocospy to intercept the text messages(SMS). people these days want to know what their children are watching and with whom they are contacting or in touch. so these type of apps is useful too.
ClickJacking Attacks. Virus, Trojan, etc. ... Phishing. ... Eavesdropping (Passive Attacks) ... Fake WAP. ... Waterhole attacks. ... Denial of Service (DoS\DDoS) ... Keylogger. A keylogger is a simple software that records the key sequence and strokes of your keyboard into a log file on your machine. ...