Take our user survey and make your voice heard.
tech

Bezos allegations put phone hacking technology in the spotlight

4 Comments
By Raphael Satter

The requested article has expired, and is no longer available. Any related articles, and user comments are shown below.

© (c) Copyright Thomson Reuters 2020.

©2024 GPlusMedia Inc.

4 Comments
Login to comment

Attend almost any security conference anywhere in the world and smart-device hacking will have a few how-to presentations. Usually, there is a tiny mistake made by either the user or a 3rd party app developer which makes root access to any device possible.

If you want the most secure device, don't install any 3rd party apps and remove all the bloated added-on apps made by either the phone/tablet device vendor or the cell data provider.

If you are a target, shut down the device completely whenever in high risk situations. The full encrypted data, 100% at rest is secure. If the device storage has been unlocked, all bets are off.

Everyone should also understand that the operator of the cell network can usually push drivers to the devices without any action by the owner/user. There is no way to block this other than not connecting to the cell network. Drivers provide root access.

1 ( +1 / -0 )

They say his girlfriend was the one who release the photos, Google Bezos Girlfriend

0 ( +0 / -0 )

Some people really like minding other people's business. Do U they having nothing to do, or they have hugenarssists complex.

0 ( +0 / -0 )

Here is how smartphones can be hijacked

You mean hacked. Freudian slip? Because the perpetrator is a Saudi? LMAO.

0 ( +0 / -0 )

Login to leave a comment

Facebook users

Use your Facebook account to login or register with JapanToday. By doing so, you will also receive an email inviting you to receive our news alerts.

Facebook Connect

Login with your JapanToday account

User registration

Articles, Offers & Useful Resources

A mix of what's trending on our other sites