Be-aware: Your Mobile may Get Hacked!

This is a Guest Post by Nazakat Hussain

I’d like to divert your attention towards an important but unsung mobile security issue i.e. hacking of your mobile phone where hacker can get access to your private information like Contacts, Messages, Photos, Videos etc using Bluetooth. Ironically, the damage can be done by simple and freely available mobile software.

Mostly the hacking software are available to be installed in Nokia S60 series phones. What this software does is that if the Bluetooth of your phone is turned on, the hacker can access your phone without your permission or Acceptance. Yes! It wont even ask you to Accept.

I’d like to share my experience. A few days back, one of my office colleagues hacked my mobile phone while sharing data through powered on Bluetooth feature. He had installed hacking software in his Nokia device.

And just to show off his expertise in hacking, he dialed another colleague’s number sitting next chair but using my phonebook contacts. I was shocked to see dialing on my device screen. He had access to my messages, audios, videos and photographs stored in my device. He could have copied all the data stored in my phone device and memory card to his mobile phone.

Although, he  hacked my mobile phone for fun only, but his act was unexpected for me.

These are suggested precautions that can save you from major privacy theft or data loss:

  • Use Bluetooth only when required
  • Do not allow connectivity to everyone
  • Turn it off when not in use


    • Assalam alaikum….
      Recently my ufone sim got hacked , it just make me worried that lmmer was able to listen my converstion and messages ive sent to people.does any one have any idea how did it happen , how tha lammer is doin it.

      Regards
      Net Spy

  • yeah , these softwares are easily available from internet. I also tried this a long time ago , using 6630 and hacked motorola L6 and n82. It is awesome . But yeah , dnt keep ur bluetooth on as any one can do any thing with out ur permission

  • Pre paid Mobile user need to be more careful now, the hacker may also transfer available balance by simply using smart share feature.

  • dear Nazakat !!!

    Are you SURE that there is a bluetooth hacking software that doesnot require permission for connecting????

  • There are many free tiny tools available for the purpose. If you want to know more info just google for Bluejacking. ;)

  • Assalam alaikum..
    My sim wasnot hack via bluetooth I dont know how cause that guys live so far from my area about 2 n half kilometer away . I wounder did it happen , any one have any idea regardon ufone hack>? Looking forward for your kind response.

    Regards

    Net_Spy

  • Friends,
    i really like this post but there’s some thing, but it gota be a threat for mobile users, and i dun like to make your post so. Remember one thing my dear Pakistani brother’s & sister’s if something wrong happens in your life/device dun get worry, be calm & then try to think where was flaw in your security/knowledge & i damn can bet with you ppl such an incident will never happen again.
    So here i’ll point out some of your side’s mistake Dear Nazakat Hussain(i dun wana say your colleague was right),
    1) when someone try to access your bluetooth through such a software that it asks you for a paired device.
    2) You’ll have to allow that person once to get in your set.

    so my dear brother do these,
    1) Don’t pair any devices with your bluetooth untill/unless you know it’s safe & necessary.
    2)Don’t let BT open cuz it use’s more power & you can get 20% more battery time by turning it on just on time.

    Hopefully you’ll understand what i said.

  • Great post, but dear one thing i wanna clear, until someone bridges connection to your blue-tooth and confirms security code on both side, till then you cant be hacked….. That’s something called “Security Key Features”. So no tension, make your blue tooth visible or invisible , you wont get hacked until you and the hacker enter a matching code!! … that’s it…

  • @ali
    dear brother..
    in old versions, the victim was asked to pair the device or acceptance to be hacked but now in the latest versions, no need of pairing or permission is required. Just one thing is necessary and that is “Blue-tooth on”.
    .
    .
    If your blue-tooth is on, then someone can hack into your cell phone.
    .
    @mushy:
    dear brother..
    That hacking softwares hack your mobile phones not your connection and that softwares are available on the internet named “super blue-tooth hack”.
    you can download latest version from http://www.hack.pt.tp
    Thanks

  • There are definitely lots of details like that to take into consideration. That could be a nice point to convey up. I offer the ideas above as general inspiration however clearly there are questions just like the one you carry up where crucial thing will probably be working in sincere good faith. I don?t know if greatest practices have emerged round things like that, but I’m certain that your job is clearly identified as a good game. Each girls and boys feel the influence of only a moment’s pleasure, for the remainder of their lives.


  • Get Alerts

    Follow ProPakistani to get latest news and updates.


    ProPakistani Community

    Join the groups below to get latest news and updates.



    >