Академический Документы
Профессиональный Документы
Культура Документы
Rashid Ganiyu
This book in dedicated to my father; Sikiru Ganiyu, mother; Afusat Ganiyu, my beautiful
sisters of the Ganiyu family. Who have been with me and supported me over the years.
You have been a loyal and understanding family. Without you all nothing would have
been possible, and with your support, there have been no limits.
Copyright © 2018 Rashid Ganiyu, All right reserved.
No part of this book may be reproduced in any form or by any electronic or mechanical
means, including information storage and retrieval systems, without permission from the
publisher. The only exception is by a reviewer, who may quote short excerpts ina
published review.
Contents
CHAPTER 1: Mobile Phone Security .............................................................................................................. 3
1.1 Introduction.................................................................................................................................. 3
1.2 Mobile phone Security level: ..................................................................................................... 4
CHAPTER 2: Spying on a Phone ..................................................................................................................... 6
2.1 Spying on a phone: .................................................................................................................... 6
2.2 How to Spy on Phone: ............................................................................................................... 6
2.3 List of Spying Tools:................................................................................................................... 7
2.4 Truth Spy: .................................................................................................................................... 7
2.5 How Truth Spy Works:............................................................................................................... 8
CHAPTER 3: Attack from the Internet ........................................................................................................... 9
3.1 Attack from the internet: ............................................................................................................ 9
3.2 Social Engineering: .................................................................................................................... 9
3.3 Social Hacking: ......................................................................................................................... 10
3.4 Types of Social Hacking:......................................................................................................... 10
CHAPTER 4: Creating a firewall ................................................................................................................... 11
4.1 Creating a Firewall for Cyber: ................................................................................................. 11
4.2 Learn the benefits of picking the right Firewall: ................................................................... 11
4.2.a Functionality and Usability: ................................................................................................. 11
4.2.b VPN Confirmation:................................................................................................................ 12
4.2.c Warranty and Technical support: ....................................................................................... 12
4.2.d The integrity of Hardware: ................................................................................................... 12
4.2.e Monitoring and Reporting: ................................................................................................... 13
4.2.f Content Filtering: ...................................................................................................................... 13
4.3.a Antivirus: ................................................................................................................................ 13
4.3.b How does antivirus work? ................................................................................................... 14
4.4.a Rooting or jail breaking a phone: ....................................................................................... 14
4.4.b Adverse effect of rooting device:........................................................................................ 14
4.4.c How do I unroot my device? ............................................................................................... 14
CHAPTER 5: Keeping the phone safe .......................................................................................................... 16
5.1 How to detect tracking software on your phone .................................................................. 16
5.2 How to prevent tracking software from getting on your phone in the first place ............. 16
1
5.3.a Cyber Security of Mobile: .................................................................................................... 17
5.3.b Why is mobile security important? ..................................................................................... 17
5.3.c Risk of mobile threat ............................................................................................................ 18
5.3.e What best security app should I use? ............................................................................... 18
CHAPTER 6: How to block spy app from one's phone ................................................................................ 19
6.1 How to remove tracking software once you’ve detected it on your phone ...................... 19
6.2 Block someone from calling or texting you:.......................................................................... 20
6.3 How do you block a number on various operating systems .............................................. 20
6.4 How do you block an incoming call? ..................................................................................... 22
6.5 How do you block unwanted text messages?...................................................................... 22
6.6 Conclusion on best practices for mobile security ................................................................ 22
2
CHAPTER 1: Mobile Phone Security
1.1 Introduction
3. Device data leakage is also another mobile security issue. Data loss and
theft to malicious applications and mobile malware are great sources of
data leakage. Increases corporate data on mobile devices increases the
4
attention of cybercriminals who can target both the devices and back-end
systems they tap into with mobile malware. Sensitive business applications
on those devices will pose a threat to such confidential files.
5
CHAPTER 2: Spying on a Phone
Phone Sector is a powerful utility app that allows you to spy on a cell phone
or any mobile device without having the device in your possession. The
app works by remotely accessing data from the target phone (the phone
you are monitoring) and displaying that data on your mobile phone, tablet
or computer. PhoneSpector claims that it will collect texts, calls, GPS,
Facebook, Twitter and more from virtually any phone.
We decided to put this sneaky little app to the test so, with the consent of
our co-worker, Tara, we remotely connected to her phone here in the office.
You will be shocked at what we discovered!
The program was a bit invasive as to any level of tracking you can think of.
Phone Sector gathered text messages, calls, GPS tracking information,
social media messages and pictures and just about everything else that
transpired on the phone. With a feature called “Stealth Camera” we were
able to secretly take a picture using the telephones camera and have that
picture sent to the phone that we were spying from. Think of it this way;
Tana, our consenting co-worker has her phone in her hands and I am
monitoring her phone from mine. I send a command to Tana’s phone telling
it to take a picture. The program snaps a picture on her phone, and then
automatically sends that picture to me. That picture is on my cell phone.
6
With the “listen to surroundings” feature I was able to activate the
microphone on Tana’s phone, allowing me to hear everything that was
going on around her phone. I listened to a conversation while using the
feature and it appear as if I were standing there myself. There are many
who will say that this is overstepping the bounds of ethical cell phone
monitoring and you might be among those who agrees to that, however this
type of application is capable of intrusive surveillance and it is available to
the average consumer for less than 65$.
• SEMrush.
• Adbeat.
• What Runs Where.
• Mix Rank
• Ontolo
• Adgooroo
• Moat.
• Keyword Spy.
• Espionage
• Kompyte
• SimilarWeb
• Alexa
• Ahrefs
• SpyFu
• The Search Monitor
• Majestic SEO
The Truth Spy takes record of things such as SMS messages and call
information along with periodic GPS locations when a GPS signal is
available.
7
There’s no need to worry about being near the device to view the activity
after installation because activities are viewable using ANY web browser,
even a Mac or phone web browser.
This new technology might sound complicated but the process is actually
quite easy using our online frequently asked question (FAQ) and other
documentation. Below you will find a miniature version of how the entire
process works. Remember, the truth Spy works on many platforms
including Android and iPhone.
A. Customer agrees to the terms and installs the truth spy onto the
phone they own and have proper consent to monitor. The customer
configures program.
B. Employee or child performs SMS messages, URL browsing, and call
activities. The Truth Spy logs the activities and inserts the logs to the
customer’s the truth spy account.
C. Customer logs into their online account from anywhere in the world
with a web browser where they can view all logged activities in near real
time.
8
CHAPTER 3: Attack from the Internet
9
Security is all about knowing what, who and when to trust. It is important to
know when you trust that the website you are using is legitimate or is safe
to provide your information. The same is true when and when not to take a
person at their word and when the person you are communicating with is
whom they say they are.
Ask any security professional and they will explain to you that the weakest
link in the security chain is the human who accepts a person or scenario at
face value. It doesn’t matter how sophisticated the security you have with
you be it many locks and deadbolts are on your doors and windows, or if
have guard dogs, alarm systems, floodlights, fences with barbed wire, and
armed security personnel; if you trust the person at the gate who says he is
the pizza delivery guy and you let him in without first checking to see if he
is legitimate you are fully exposed to whatever risk he represents.
They are the social engineers, hackers who look for one weakness to
exploit in each and every organization: human psychology. Using various
medium, including phone calls and social media, these attackers trick
people into offering them access to sensitive information.
Key logger
Denial of Service
Waterhole attacks
Fake WAP
Eavesdropping (Passive Attacks)
Phishing
Virus,
Trojan
Click jacking Attacks
10
CHAPTER 4: Creating a firewall
11
failures and make it’s easier to train staff and implement changes,
upgrades, and replacement.
A good firewall isn’t just to keep hackers and unauthorized traffic out of the
network. A good firewall will also establish and monitor secure channels,
enabling remote connectivity. When you purchase a hardware-based
firewall make sure it supports both SSL- and IPSec- protected VPN
connections from similar devices (for point-to-point or site-to-site VPNs), as
well as secure connections from traveling employees. This is critical when
protecting a critical personal client and business data. Creating a Virtual
Private Network connection is one of the single most critical things a
business owner can do to create a secure remote connection. Don't skimp
on this feature.
Hardware fails. Ensure 24×7 technical support is out there and implement
technical support contracts with the firewall's manufacturer. Get a 24/7
warranty, if your business class device fails you're not going to be able to
pick it up at a local store so either has a spare on hand or get a good
warranty. Having a down firewall for a day or two can lead to complete
failure inclusive of email, internet, and remote connectivity.
12
4.2.e Monitoring and Reporting:
4.3.a Antivirus:
13
4.3.b How does antivirus work?
A virus becomes active when a document infected with the virus is opened
using the program it is designed to attack. An infected document spread by
opening the document on another computer, when the document is opened
on a new computer which has not been infected before, it will infect the
new computer and, the global settings used by that copy of the application
will be infected as well. A boot sector virus infects diskettes and hard disks.
14
Tap "Full Unroot"
Read the permission prompt and then tap "Continue"
Reboot your device once SuperSU closes
Use Unroot app if this method fails.
15
CHAPTER 5: Keeping the phone safe
Other common pointers of tracking software are listed below. This list is
inexhaustible, so you may be infected with tracking software even if you
don’t experience any of these symptoms.
16
Hand your phone to trusted people and do not give it to someone you
don’t know.
Download programs only from safe, trusted sources and reputable
developers
Always password protects your cell phone login screen.
Always require a password before downloading an application.
Download the latest anti-malware software, always keep it updated
and scan your phone daily.
Keep your Bluetooth and Wi-Fi connection in a secure mode and
never accept or access Bluetooth connections that you are unfamiliar
with.
Read the Terms & Conditions, Legal Disclaimers and Privacy Policy
of all the apps that you install on your phone. We understand that the
majority of people do not spend time reading these policies but a
quick read today will save you a significant amount of time tomorrow.
When reading one of these policies, look for language that indicates
that the app provider is authorized to track your information.
Always be alert about the unusual behavior of the mobile phone such
as slower performance, lower brightness, auto restarts, etc.
Do not grant access to your confidential information to any third party
application or website. If you don't have to give out your name,
address, phone number, email, or other personally identifiable
information, don't give it out.
Do not install a pirated version of any applications. These are
sometimes merged with malware.
The importance of mobile security; Mobile devices are a part of our life. As
the use of phones keeps growing, security risks also keeps increasing
too. Mobile security can be compromised due to design flaws,
17
vulnerabilities, and protocol failures in any mobile applications, viruses,
spyware, malware, and other threats.
Mobile threat is an occurrence we can do away with this recent time and in
the future as a result of emerging technology, the following are the alighted
risk if a robust system of mobile device management is not put in place in
an organization which is:
1) Loss of sensitive corporate and customer data
2) Installing malware-infected or unauthorized app
3) Unrestricted and unfiltered access to undesirable website content
4) Malicious activity from employees or compromised devices.
5) mobile malware
6) social engineers
7) stolen data due to loss, theft, or disposal of unauthorized access
18
CHAPTER 6: How to block spy app from one's phone
The ways to remove tracking threats on your phone range from easy
activity to extreme measures like formatting your phone. Some steps you
can take are listed below. You should consider the remedy that is most
applicable to your device, depending on your level of concern and your
phone’s vulnerability.
Look for unfamiliar programs that are installed: Look through all
your applications and installations for anything unfamiliar. There may
be quite a few strangely named programs running that are perfectly
normal. But if you see a program or application that you did not
install, then you should do your research into what it is because that
could be the center of your troubles.
Factory Reset: If you are having trouble locating the exact program and
application which contains the tracking software then you might be left with
19
only one option – factory reset. While this method is the best way to
eliminate unwanted programs or apps, there are a couple caveats.
IOS
Note: If you block someone from sending you texts, Face Time, or
voice calls, they will be automatically blocked from doing all three
the
To block a number that called you, go into the Phone app, select
Recently. Find the number and click i in the circle next to it. You'll
get a screen with information about the call and actions to take,
scroll down to place where you get Block This Caller.
20
If you think they'll sneak a peek at you with Face Time and then go
to that app, find the last Face Time conversation you had with them,
and click the I in the circle next to it. You'll get a screen with
information about the actions to take; scroll down to Block This
Caller. If it's someone in your Contacts, go to Settings > Face Time
> Blocked > Add New, and select the name or names to block.
Android
for Nougat or Marshmallow, open Dialer, go to your recent calls
list, find the number you want to block and select Block/Report
Spam. (If you do not want to report the number as spam, you can
uncheck the box.) Then tap Block.
For Lollipop, go to the Phone app and select Call Settings > Call
Rejection > Auto Reject List. Search for or type in the number or
select it and you're done.
If you use Messenger for messages, tap the name or number that
sent you the message on the messenger in your message’s list and
select Block/Report Spam. (If you do not want to report the number
as spam, you can uncheck the box). For Contacts, go into
Messenger, select Menu > Blocked Contacts > Add a Number and
key in the number you want to block.
Windows
To block calls and messages go to Settings and then tap the
Call+SMS Filter, accept the Terms of Use and Privacy Policy if you
have not already, then switch Block Calls to On. Now go to the
Phone app then hold down the number you want to block, and hit
Block Number, then OK.
From the call log, you can block incoming calls from specific numbers.
Select the number you want to block, and then hit more or the 3-dot menu
icon in the upper-right corner and choose to Add to reject list. This will
disable incoming calls from specific numbers.
22
4) Using a mobile security app to protect against malicious apps, web
threats, and to deploy a measure against lost devices protection.
5) Set your Smartphone to lock after a short idle time, and set it to
require authentification for unlocking.
6) Make use of Mobile Device Management (MDM) or Enterprise Mobile
Management (EMM).
23
About the Author
Rashid Ganiyu is an Ethical hacker with over three years experience. Found loop holes
in the mobile phones and bring to the readers a way out to the various cyber
vulnerability, and our mobile phones are exposed to.