Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data analytics and truck accident claims
    How Data Analytics Reduces Truck Accidents and Speeds Up Claims
    7 Min Read
    predictive analytics for interior designers
    Interior Designers Boost Profits with Predictive Analytics
    8 Min Read
    image fx (67)
    Improving LinkedIn Ad Strategies with Data Analytics
    9 Min Read
    big data and remote work
    Data Helps Speech-Language Pathologists Deliver Better Results
    6 Min Read
    data driven insights
    How Data-Driven Insights Are Addressing Gaps in Patient Communication and Equity
    8 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Phone Hacking Scandal Reinforces the Value of Basic Information Security
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Data Management > Best Practices > Phone Hacking Scandal Reinforces the Value of Basic Information Security
Best PracticesSecurity

Phone Hacking Scandal Reinforces the Value of Basic Information Security

AlexOlesker
AlexOlesker
4 Min Read
SHARE

The recent phone hacking scandal, where repo

The recent phone hacking scandal, where reporters from Rupert Murdoch’s News of the World were accused of illegally accessing the voicemails of thousands of people including politicians, members of the royal family, the families of soldiers killed in Afghanistan, and terror victims, has grown into a sordid, drawn-out affair resulting in the closure of the newspaper, the arrest of editor Rebekah Brooks, and the resignation of the head of London’s Metropolitan Police. The latest in an international string of “hacking” news such as attacks by LulzSec and Anonymous, the scandal once again brings the threat of information theft and espionage into the news. But what is phone hacking, and how can individuals and organizations defend against such attacks?

Though the media fixates on shadowy, mysterious, all-powerful hackers, unathorized entry into somebody’s voicemail account is usually shockingly easy. When you call your own number or an external number provided by the phone company, you reach your mailbox. All it takes to gain access to another’s messages it to convince the phone that you are its owner. This is usually determined by your caller ID, which can easily be spoofed using Voice Over IP and a bit of code. According to hacker turned security expert Kevin Mitnick, ”Any 15-year-old that knows how to write a simple script can find a VoIP provider that spoofs caller ID and set this up in about 30 minutes. If you’re not adept at programming, you could use a spoofing service and pay for it.”

The journalists accused of phone hacking are alleged to have used an even simpler method. Calling the external voicemail number, they had to input a PIN to prove that the the messages they wanted to play were theirs. The majority of cell phone owners, however, keep their default PINs, which are either the last 4 digits of your phone number or a combination that can easily be found online.

More Read

Who Is Paying the Bill for Data Breaches? [INFOGRAPHIC]
Rock • Analyst • Hard Place
A Quick Tech Tutorial: Two-Factor Authentication
Citizen Development 101: Understanding the Basics
How Nonprofits Like the YMCA Use Data to Maximize Community Impact & ROI

Voice mailboxes are targets of opportunity, and most phone hacking could be prevented by first setting your phone to require a PIN when remotely accessing voice mail, and making that PIN as strong as possible. This should come as no surprise, as most attacks can be prevented through information security basics and common sense measures. Looking back at LulzSec’s initial online rampage, for example, most of their attacks were very simple, exploiting reused passwords or SQL injections. While a case can be made for stronger security from the telec0ms surrounding voicemail, just like LulzSec and most criminal hackers, the News of the World journalists leveraged the most basic human failures rather than zero-day exploits on high-end security software. This scandal, and all the nastiness that surrounds it, is a good reminder to prioritize the basics of information systems security, like strong passwords, constant patching, and user vigilance.

TAGGED:cellphonehacking
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

data analytics and truck accident claims
How Data Analytics Reduces Truck Accidents and Speeds Up Claims
Analytics Big Data Exclusive
predictive analytics for interior designers
Interior Designers Boost Profits with Predictive Analytics
Analytics Exclusive Predictive Analytics
big data and cybercrime
Stopping Lateral Movement in a Data-Heavy, Edge-First World
Big Data Exclusive
AI and data mining
What the Rise of AI Web Scrapers Means for Data Teams
Artificial Intelligence Big Data Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

bitcoin hackers and its safety
BlockchainExclusive

Useful Tips To Protect Your Bitcoin From Hackers

4 Min Read
Internet of ThingsSecurity

The Hidden Dangers Of The Internet of Things [Infographic]

5 Min Read

Social Engineering — Hacking by Asking

9 Min Read

AT&T’s service, called FamilyMaps, allows people to…

1 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai chatbot
The Art of Conversation: Enhancing Chatbots with Advanced AI Prompts
Chatbots
ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?