This is a Guest Post by Nazakat Hussain
I’d like to divert your attention towards an important but unsung mobile security issue i.e. hacking of your mobile phone where hacker can get access to your private information like Contacts, Messages, Photos, Videos etc using Bluetooth. Ironically, the damage can be done by simple and freely available mobile software.
Mostly the hacking software are available to be installed in Nokia S60 series phones. What this software does is that if the Bluetooth of your phone is turned on, the hacker can access your phone without your permission or Acceptance. Yes! It wont even ask you to Accept.
I’d like to share my experience. A few days back, one of my office colleagues hacked my mobile phone while sharing data through powered on Bluetooth feature. He had installed hacking software in his Nokia device.
And just to show off his expertise in hacking, he dialed another colleague’s number sitting next chair but using my phonebook contacts. I was shocked to see dialing on my device screen. He had access to my messages, audios, videos and photographs stored in my device. He could have copied all the data stored in my phone device and memory card to his mobile phone.
Although, he hacked my mobile phone for fun only, but his act was unexpected for me.
These are suggested precautions that can save you from major privacy theft or data loss:
- Use Bluetooth only when required
- Do not allow connectivity to everyone
- Turn it off when not in use
its really a usefull information . Thanks
Assalam alaikum….
Recently my ufone sim got hacked , it just make me worried that lmmer was able to listen my converstion and messages ive sent to people.does any one have any idea how did it happen , how tha lammer is doin it.
Regards
Net Spy
using some blue tooth tricks you can restart the someone mobile also ;)
yeah , these softwares are easily available from internet. I also tried this a long time ago , using 6630 and hacked motorola L6 and n82. It is awesome . But yeah , dnt keep ur bluetooth on as any one can do any thing with out ur permission
hy
i hacked many mobiles with my mobile which is sony ericsson k790i.
this typrs of softwares are avaliable at http://www.zedge.net and http://www.mobiles24.com
Pre paid Mobile user need to be more careful now, the hacker may also transfer available balance by simply using smart share feature.
What is The name Of that Software?
dear Nazakat !!!
Are you SURE that there is a bluetooth hacking software that doesnot require permission for connecting????
There are many free tiny tools available for the purpose. If you want to know more info just google for Bluejacking. ;)
Assalam alaikum..
My sim wasnot hack via bluetooth I dont know how cause that guys live so far from my area about 2 n half kilometer away . I wounder did it happen , any one have any idea regardon ufone hack>? Looking forward for your kind response.
Regards
Net_Spy
Friends,
i really like this post but there’s some thing, but it gota be a threat for mobile users, and i dun like to make your post so. Remember one thing my dear Pakistani brother’s & sister’s if something wrong happens in your life/device dun get worry, be calm & then try to think where was flaw in your security/knowledge & i damn can bet with you ppl such an incident will never happen again.
So here i’ll point out some of your side’s mistake Dear Nazakat Hussain(i dun wana say your colleague was right),
1) when someone try to access your bluetooth through such a software that it asks you for a paired device.
2) You’ll have to allow that person once to get in your set.
so my dear brother do these,
1) Don’t pair any devices with your bluetooth untill/unless you know it’s safe & necessary.
2)Don’t let BT open cuz it use’s more power & you can get 20% more battery time by turning it on just on time.
Hopefully you’ll understand what i said.
great view. I think the same
Great post, but dear one thing i wanna clear, until someone bridges connection to your blue-tooth and confirms security code on both side, till then you cant be hacked….. That’s something called “Security Key Features”. So no tension, make your blue tooth visible or invisible , you wont get hacked until you and the hacker enter a matching code!! … that’s it…
Hellow guys..
can any body tell me wat is the hacking software name of ufone connection.. if any body knows so pls tell me on my mail.. [email protected]..
@ali
dear brother..
in old versions, the victim was asked to pair the device or acceptance to be hacked but now in the latest versions, no need of pairing or permission is required. Just one thing is necessary and that is “Blue-tooth on”.
.
.
If your blue-tooth is on, then someone can hack into your cell phone.
.
@mushy:
dear brother..
That hacking softwares hack your mobile phones not your connection and that softwares are available on the internet named “super blue-tooth hack”.
you can download latest version from http://www.hack.pt.tp
Thanks
There are definitely lots of details like that to take into consideration. That could be a nice point to convey up. I offer the ideas above as general inspiration however clearly there are questions just like the one you carry up where crucial thing will probably be working in sincere good faith. I don?t know if greatest practices have emerged round things like that, but I’m certain that your job is clearly identified as a good game. Each girls and boys feel the influence of only a moment’s pleasure, for the remainder of their lives.