The requested article has expired, and is no longer available. Any related articles, and user comments are shown below.
© (c) Copyright Thomson Reuters 2020.Bezos allegations put phone hacking technology in the spotlight
By Raphael Satter WASHINGTON©2024 GPlusMedia Inc.
4 Comments
Login to comment
theFu
Attend almost any security conference anywhere in the world and smart-device hacking will have a few how-to presentations. Usually, there is a tiny mistake made by either the user or a 3rd party app developer which makes root access to any device possible.
If you want the most secure device, don't install any 3rd party apps and remove all the bloated added-on apps made by either the phone/tablet device vendor or the cell data provider.
If you are a target, shut down the device completely whenever in high risk situations. The full encrypted data, 100% at rest is secure. If the device storage has been unlocked, all bets are off.
Everyone should also understand that the operator of the cell network can usually push drivers to the devices without any action by the owner/user. There is no way to block this other than not connecting to the cell network. Drivers provide root access.
Yrral
They say his girlfriend was the one who release the photos, Google Bezos Girlfriend
TARA TAN KITAOKA
Some people really like minding other people's business. Do U they having nothing to do, or they have hugenarssists complex.
Aly Rustom
You mean hacked. Freudian slip? Because the perpetrator is a Saudi? LMAO.