Skip links

Has your iPhone been hacked?

[cs_content][cs_section parallax=”false” style=”margin: 0px;padding: 45px 0px;”][cs_row inner_container=”true” marginless_columns=”false” style=”margin: 0px auto;padding: 0px;”][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/1″ style=”padding: 0px;”][cs_text]By Yogi Schulz – January 11, 2017

Read more: http://www.itworldcanada.com for more Canadian IT News

Hackers try to hide their activities and hope you won’t notice when they’re stealing your identity and your data from your smartphone.

Here are some of the more frequent signs that you’re being hacked and how to minimize the risk or thwart the attack.[/cs_text][/cs_column][/cs_row][/cs_section][cs_section parallax=”false” style=”margin: 0px;padding: 45px 0px;”][cs_row inner_container=”true” marginless_columns=”false” style=”margin: 0px auto;padding: 0px;”][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/2″ style=”padding: 0px;”][x_image type=”none” src=”http://www.sos-ca.com//wp-content/uploads/2015/04/Picture1-1.png” alt=”” link=”false” href=”#” title=”” target=”” info=”none” info_place=”top” info_trigger=”hover” info_content=””][/cs_column][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/2″ style=”padding: 0px;”][cs_text]Wi-Fi in public places, such as cafes or stores are often unsecure for the convenience of patrons. However, unsecured Wi-Fi lets malicious hackers easily intercept your data stream while you’re connected. Such intercepts are called man-in-the-middle attacks. In this attack a hacker intercepts the data stream without anyone receiving any indication of the interception. The risk of such an attack is the same at nationally recognized brands, which may operate with more security-consciousness, and at local businesses.

An unsecured Wi-Fi network is indicated by the absence of the small black padlock symbol as shown at left.

Some businesses create the appearance of security-consciousness by using a secure Wi-Fi network and then publishing the password on a sign on the wall for all customers to see. Unfortunately, this configuration is not any better than providing an unsecure Wi-Fi connection. The password, which acts as a private key for encryption, is now a public key that is available to hackers for decrypting all data streams.

A simple, low risk alternative is to use your cellular network connection and pay for data if you must connect where you do not have private credentials for a secure Wi-Fi network.

You can also protect yourself against these hackers by using virtual private network (VPN) software and the related service.

To protect yourself, avoid connecting to public Wi-Fi and thereby compromising your personal data.[/cs_text][/cs_column][/cs_row][/cs_section][cs_section parallax=”false” style=”margin: 0px;padding: 45px 0px;”][cs_row inner_container=”true” marginless_columns=”false” style=”margin: 0px auto;padding: 0px;”][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/2″ style=”padding: 0px;”][cs_text]Unsecured web service
When you see this server identity dialogue box, one of your smartphone’s active tasks is trying to contact a website but cannot verify the authenticity of the certificate for that website.

Before you click on Continue, think for a moment. Did you mistype the domain name you intended to type? Do you trust the domain name shown and have you been there before?
If you answered no, someone is trying to lead you to a fake website that is masquerading for a major website you visit regularly. This can be a typosquatting or a DNS spoofing/poisoning attack. The hacker’s goal is to infect your iPhone with malware and likely breach your data.

To protect yourself and your personal data, type domain names carefully and always click on Cancel. If you are technically inclined, you can verify the DNS IP addresses on your network adapter settings and your gateway’s DHCP settings.[/cs_text][/cs_column][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/2″ style=”padding: 0px;”][x_image type=”none” src=”http://www.sos-ca.com//wp-content/uploads/2015/04/Picture2.png” alt=”” link=”false” href=”#” title=”” target=”” info=”none” info_place=”top” info_trigger=”hover” info_content=””][/cs_column][/cs_row][/cs_section][cs_section parallax=”false” style=”margin: 0px;padding: 45px 0px;”][cs_row inner_container=”true” marginless_columns=”false” style=”margin: 0px auto;padding: 0px;”][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/2″ style=”padding: 0px;”][x_image type=”none” src=”http://www.sos-ca.com//wp-content/uploads/2015/04/Picture3.png” alt=”” link=”false” href=”#” title=”” target=”” info=”none” info_place=”top” info_trigger=”hover” info_content=””][/cs_column][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/2″ style=”padding: 0px;”][cs_text]Evil twin Wi-Fi
An evil twin is a fraudulent Wi-Fi access point that appears to be legitimate. It claims to be one of the Wi-Fi access points on the list of Wi-Fi access points that your iPhone is aware of and will connect to automatically when your iPhone is searching for a Wi-Fi connection.

The hacker’s goal is to eavesdrop on wireless communications to steal User IDs and passwords or send malicious content back to you. The evil twin is the wireless network equivalent of the phishing scam.

The evil twin access point is typically configured to pass Internet traffic through to the legitimate Wi-Fi access point while monitoring the victim’s data stream. This pass-through approach ensures the victim is oblivious to the hacker’s presence.

To protect yourself against an evil twin hacker, check the name of the Wi-Fi access point you are connected to under Settings. If the name shown is for a Wi-Fi access point that you know is located somewhere else, then you’ve become a victim of this hacker. You should immediately turn off your Wi-Fi network. Then use your cellular network connection and pay for data if you must connect immediately.[/cs_text][/cs_column][/cs_row][/cs_section][cs_section parallax=”false” style=”margin: 0px;padding: 45px 0px;”][cs_row inner_container=”true” marginless_columns=”false” style=”margin: 0px auto;padding: 0px;”][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/2″ style=”padding: 0px;”][cs_text]Malicious apps
Applications add useful functionality to smartphones but also increase the risk of a data breach. This risk is greatly increased if you download apps from untrusted websites, as illustrated at left, instead of from an authorized app store. Hidden inside these malicious apps, even ones that perform the functionality you’re expecting, could be malware that lets hackers steal your data.

A good example was the recent Pokémon Go craze. That phenomena encouraged quite a number of unscrupulous hackers to offer malicious apps under the guise of offering improved features, access to supposedly secret commands or improved game performance.

To protect yourself from a data breach caused by malicious apps:

Download apps only at the authorized app store for your brand of smartphone. Don’t download apps from a link in an email or a text message. These sources are typically malicious spam from hackers.
Read at least one review for an app you are thinking of downloading. Reviews will alert you to potential malicious apps.
Ignore apps that claim they will enhance your game or smartphone performance in some way. Apps can’t actually perform this feat.
Limit the number of apps you install to what you know you will actually use.
Report iOS or Android malicious apps if you encounter one.[/cs_text][/cs_column][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/2″ style=”padding: 0px;”][x_image type=”none” src=”http://www.sos-ca.com//wp-content/uploads/2015/04/apps-620×250.png” alt=”” link=”false” href=”#” title=”” target=”” info=”none” info_place=”top” info_trigger=”hover” info_content=””][/cs_column][/cs_row][/cs_section][cs_section parallax=”false” style=”margin: 0px;padding: 45px 0px;”][cs_row inner_container=”true” marginless_columns=”false” style=”margin: 0px auto;padding: 0px;”][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/2″ style=”padding: 0px;”][x_image type=”none” src=”http://www.sos-ca.com//wp-content/uploads/2015/04/email.png” alt=”” link=”false” href=”#” title=”” target=”” info=”none” info_place=”top” info_trigger=”hover” info_content=””][/cs_column][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/2″ style=”padding: 0px;”][cs_text]Dangerous email
Enticing you to click on a link in a text messages or an email is a common avenue hackers use to steal your information or to install malware on your smartphone.

This is called a phishing attack. The hacker’s goal is to infect your iPhone with malware and likely breach your data.

Glide over, don’t click, the link in a text message or an email to reveal exactly where the link will send you if you were to click on it. That’s an easy way to differentiate legitimate messages from hacker messages. Just reading the text of the link is not enough.

In the example at left, the hacker is impersonating Air Canada. By gliding over the prominent blue link, you will reveal the real Uniform Resource Locator (URL) that the link refers to. Because the real URL is unrelated to Air Canada, this is a dangerous phishing message.

Don’t click links in messages without investigation.[/cs_text][/cs_column][/cs_row][/cs_section][cs_section parallax=”false” style=”margin: 0px;padding: 45px 0px;”][cs_row inner_container=”true” marginless_columns=”false” style=”margin: 0px auto;padding: 0px;”][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/2″ style=”padding: 0px;”][x_image type=”none” src=”http://www.sos-ca.com//wp-content/uploads/2015/04/cellular.png” alt=”” link=”false” href=”#” title=”” target=”” info=”none” info_place=”top” info_trigger=”hover” info_content=””][/cs_column][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/2″ style=”padding: 0px;”][cs_text]Cellular network spoofing
With some expensive equipment and a lot of technical know-how, hackers are beginning to learn how to spoof cellular networks to perform man-in-the-middle attacks.

Hackers pick crowded public places, such as museums or airports, because there are lots of active smartphones and we are less alert because we expect reasonable security.

In the example at right, I am not connected to Wi-Fi, but I am connected to the Verizon LTE cellular network.

In this example the hacker is trying to lure me into clicking on the mislabeled website link to claim my fake prize award. If I click as suggested, I will cause malware to install itself on my iPhone.

The best action, to thwart this attack, is to double tap the Home button to reveal all running apps in the multitasking manager. Then quickly swipe the Safari app up so that it’s no longer running. You will also want to place your smartphone in Airplane Mode until you have returned to a safer location far from the initial intercept.

To protect yourself and your personal data, be careful when clicking on website links to avoid downloading malware that will gather personal information.[/cs_text][/cs_column][/cs_row][/cs_section][cs_section parallax=”false” style=”margin: 0px;padding: 45px 0px;”][cs_row inner_container=”true” marginless_columns=”false” style=”margin: 0px auto;padding: 0px;”][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/2″ style=”padding: 0px;”][cs_text]Operating system flaws
Despite the best intentions of smartphone manufacturers, operating system flaws exist and will be discovered. These flaws can let hackers in. Some of the flaws not only allow hackers to steal your data but also to gain access to your smartphone remotely and control it.

To correct flaws and protect end-users, smartphone manufacturers release operating system updates frequently. Your iPhone will indicate an update is available to be installed by displaying a “one” on the Settings icon as illustrated at left.

Install operating system updates as soon as they become available. This action is important because, once updates are released, your risk of being hacked actually goes up if you fail to install the update. Hackers will now know about the technical details of the flaws being corrected and will use that knowledge to attempt breaches of out-of-date smartphones.[/cs_text][/cs_column][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/2″ style=”padding: 0px;”][x_image type=”none” src=”http://www.sos-ca.com//wp-content/uploads/2015/04/OS.png” alt=”” link=”false” href=”#” title=”” target=”” info=”none” info_place=”top” info_trigger=”hover” info_content=””][/cs_column][/cs_row][/cs_section][cs_section parallax=”false” style=”margin: 0px;padding: 45px 0px;”][cs_row inner_container=”true” marginless_columns=”false” style=”margin: 0px auto;padding: 0px;”][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/2″ style=”padding: 0px;”][x_image type=”none” src=”http://www.sos-ca.com//wp-content/uploads/2015/04/Aoo.png” alt=”” link=”false” href=”#” title=”” target=”” info=”none” info_place=”top” info_trigger=”hover” info_content=””][/cs_column][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/2″ style=”padding: 0px;”][cs_text]Despite the best intentions of smartphone app developers, software defects exist and will be discovered by end-users. Sometimes these defects can let hackers in to steal your identity and your data.

To correct software defects and protect end-users, smartphone app developers release app updates. Your iPhone will indicate app updates are available to be installed by displaying a number on the App store icon as illustrated at left.

To protect yourself, install app updates as soon as they become available.

What is your experience with strategies for reducing your risk of smartphone data breaches?[/cs_text][/cs_column][/cs_row][/cs_section][/cs_content]