Application that was developed in the laboratory Kindsight showed how easy it is to make your smart phone a smart secret agent.
We have already heard enough about applications that take data unauthorized from your smart phone. But there is a company which is dealing with security of applications, that we install on our smart phones and it warns about the exact applications that can turn in real spies.
People who are in charge of security in the company made an application that can prove that this works, and they were able to trace the locations of the user's messages, to record phone calls and to take the pictures that were captured by the owner of the smart phone.
The application that is named DroidWhisper can be hidden in any Android application and hidden like that in the background of the smart phone can operate.
After the installation, DroidWhisper receives instructions from the master of the server via Internet or SMS message. All data collected from the victim DroidWhisper transfers to the main server where it gathers literally all the data from all smart phones.
"Smartphones are great platform for inside attacks or for attacks on the network state", said the head of the laboratory explaining that such a devices are easy targets for monitoring.
We have already heard enough about applications that take data unauthorized from your smart phone. But there is a company which is dealing with security of applications, that we install on our smart phones and it warns about the exact applications that can turn in real spies.
Droid Whisper
People who are in charge of security in the company made an application that can prove that this works, and they were able to trace the locations of the user's messages, to record phone calls and to take the pictures that were captured by the owner of the smart phone.
The application that is named DroidWhisper can be hidden in any Android application and hidden like that in the background of the smart phone can operate.
After the installation, DroidWhisper receives instructions from the master of the server via Internet or SMS message. All data collected from the victim DroidWhisper transfers to the main server where it gathers literally all the data from all smart phones.
"Smartphones are great platform for inside attacks or for attacks on the network state", said the head of the laboratory explaining that such a devices are easy targets for monitoring.
EmoticonEmoticon