SlideShare a Scribd company logo
Live Mobile Hacking
Basel Alothman
•PhD Researcher in DeMontfort University, Leicester UK.
•MSc in Computer Science, University of Hertfordshire, UK,2013.
•BSc in Computing & Information System, University of Dubai, UAE, 2011.
•CeM112685 (Certified e-Marketer from e-Marketing Association)
•CPTE 5601 (Certified Penetration Testing Engineer from mile2)
•LPT (Licensed Penetration Tester)
•ECSA ECC-26988904 (EC-Council Certified Security Analyst)
•CEH ECC-26853113 (Certified Ethical Hacker from EC-Council)
•ISSA Membership #3138043
•ISACA Membership -London Chapter -#786192
•BSC Membership #990431538
•AoIR Membership (Basil Alothman)
Types of hackers?
Why the hackers want to hack you?
 Steal your passwords.
 Steal your photos/picture
 Steal your personal videos
 Steal your SMS/messages
 Steal your money/bank information
 Know your health status
 Steal any important information
 Steal your contacts list
 ..etc.
How the Hackers can Hack you?
 Social Engineering
 Physical Attacks
 Accounts Synchronizations
 3rd party applications
 Application permission
 Jailbreak, rooting
 Malware
Live Mobile Hacking
How to create strong Password?
1. Hide your password in safe place.
2. Create more than 7 character (numbers, letters
and code($#!^&).
3. Choose between capital and small letters.
4. Avoid common password like abcd 12345
5. Avoid the words used in dictionary
6. Change your password between time to time
Ex: H@cKeRs582
How they steal data with less than 2 min?
 Fake Charger
 Automatic
Back-up System
 Cloud Computing
Syncronization
What is Smartphone Malware?
 Smartphone Malware
 GooglePlay is not safe to download application
(Some application are malicious it might steal your
data, spy on your hardware feature…etc.).
 Application Permission vulnerabilities.
 Application Permission update.
 Apps Review.
How to protect your self/family/mobile from getting hacked?
 Stealing Device:
 Secure your “Lock Screen”.
 Install trace phone application and try now.
 Stealing Data:
 Don’t share any personal information (maybe today is
not important but tomorrow not.
 Check your cloud computing synchronization.
 Check your social networks synchronization.
 Check your installed application and sign-out and
delete those which are not trusted application.
Thanks
Basel Alothman
http://About.me/ALOTHMAN

More Related Content

PPTX
Introduction ethical hacking
PPSX
Ethical Hacking
PPT
Ethical hacking-ppt-download4575
PDF
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
PPTX
Ethical hacking introduction to ethical hacking
PPTX
Spyware risk it's time to get smart
PDF
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
DOCX
Ethical hacking
Introduction ethical hacking
Ethical Hacking
Ethical hacking-ppt-download4575
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
Ethical hacking introduction to ethical hacking
Spyware risk it's time to get smart
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
Ethical hacking

What's hot (20)

PPTX
Ethical Hacking
PDF
Ethical hacking
PPTX
Internetsecuritypowerpoint 130404101055-phpapp02
PPTX
Ethical Hacking
PPTX
Ethical hacking
PPTX
Ethical hacking
PPT
Sahilmod 120315100301-phpapp01
PPT
Ethical hacking
PPTX
Ethical hacking ppt
PPTX
Ethical Hacking
PDF
Security Breaches from Compromised User Logins
PPTX
Types of Malware (CEH v11)
PDF
The internet is broken, by Ola Bini
PPT
Hacking Kishor
PPTX
Cse ethical hacking ppt
PPT
Ethical hacking
PPTX
Introduction To Ethical Hacking
PPT
Ethical Hacking
DOCX
Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking
Ethical hacking
Internetsecuritypowerpoint 130404101055-phpapp02
Ethical Hacking
Ethical hacking
Ethical hacking
Sahilmod 120315100301-phpapp01
Ethical hacking
Ethical hacking ppt
Ethical Hacking
Security Breaches from Compromised User Logins
Types of Malware (CEH v11)
The internet is broken, by Ola Bini
Hacking Kishor
Cse ethical hacking ppt
Ethical hacking
Introduction To Ethical Hacking
Ethical Hacking
Ethical Hacking (CEH) - Industrial Training Report

Viewers also liked (20)

PDF
каталог Aeg 12 13
PPT
Free kpi
PPTX
PPTX
Production of 1-Tetradecene at 100 tons per year
PPT
Delivery kpi
PPTX
Cash for gold company canada
PPTX
Lr6n
PPT
Definition of a kpi
PDF
Dr. Maher salameh - new age of data analytics
PDF
Roadway Ordinance
PPTX
Media Buy
PPTX
Agnosticism
PPTX
X pages day発表_20141118
DOC
Sankar Resume
PPT
Gsm kpi
PPT
kolonisasyon sa asya
PPTX
Lr2n
PPTX
Fragmented Audiences in a Diverse Media Landscape
DOCX
Analisa morfologi barium heksaferit dengan sem
PPTX
Advertising Methods
каталог Aeg 12 13
Free kpi
Production of 1-Tetradecene at 100 tons per year
Delivery kpi
Cash for gold company canada
Lr6n
Definition of a kpi
Dr. Maher salameh - new age of data analytics
Roadway Ordinance
Media Buy
Agnosticism
X pages day発表_20141118
Sankar Resume
Gsm kpi
kolonisasyon sa asya
Lr2n
Fragmented Audiences in a Diverse Media Landscape
Analisa morfologi barium heksaferit dengan sem
Advertising Methods

Similar to Dr. Basel Al - Othman - Live mobilehacking (20)

PDF
The Immune System of Internet
PPT
Marcos de Pedro Neoris authenware_cybersecurity step1
PPT
IT Security Awareness-v1.7.ppt
PDF
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
PPTX
CyberSecurityPPT presentation _V3_1.pptx
PDF
Module 3-cyber security
PPTX
CyberSecurityPPT_V3_1.pptx Awerness cyber
PPT
Dos and Dont to be followed to protect information and technology
PDF
Ethical hacking and social engineering
PPTX
CYBER SECURITY and to protect our selves
PPTX
CyberSecurityPPT_V3_1.pptx CyberSecurityPPT_V3_1.pptx
PPTX
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
PPT
Ethical Hacking
PPTX
CyberSecurity topics with challenges.pptx
PPT
It security &_ethical_hacking
PDF
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
PPTX
CyberSecurity Presentation on Cyber security practicies
PPTX
CyberSecurityPPT NIC Goverment Powerpoint
PPTX
CyberSecurityPPT_V3_1 for each individual
The Immune System of Internet
Marcos de Pedro Neoris authenware_cybersecurity step1
IT Security Awareness-v1.7.ppt
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
CyberSecurityPPT presentation _V3_1.pptx
Module 3-cyber security
CyberSecurityPPT_V3_1.pptx Awerness cyber
Dos and Dont to be followed to protect information and technology
Ethical hacking and social engineering
CYBER SECURITY and to protect our selves
CyberSecurityPPT_V3_1.pptx CyberSecurityPPT_V3_1.pptx
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Ethical Hacking
CyberSecurity topics with challenges.pptx
It security &_ethical_hacking
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
CyberSecurity Presentation on Cyber security practicies
CyberSecurityPPT NIC Goverment Powerpoint
CyberSecurityPPT_V3_1 for each individual

More from promediakw (20)

PPTX
ورقة عمل المؤتمر الخليجي الثاني بالكويت تقديم دكتور عنتر سليمان
PPTX
دور التدريب فى تحقيق الميزة التنافسية محمد عمرو صادق
PPT
إنجح في التوظيف ميلاد حدشيتي
PPTX
الكوتشنج الوظيفي مؤتمر الموارد البشرية الخليجي- أحمد مجدي
PPT
2د. محمد كمال
PPT
د. محمد كمال
PPTX
وليد حمود ورقة الأمانة العامة
ODP
محمد العوفي - تنمية الموارد البشرية الخليجية كمدخل استراتيجي لتحقيق ثروة
PPTX
أمل الرشدان -التحسين المستمر بروميديا
PPT
بناء الثقافة الوظيفية - محمد كمال
PPTX
Eng. salman zafar - Concept of zero wastes and role of material recovery faci...
PPT
مؤتمر النفايات
PDF
Eng. ch. rama krushna chary drilling waste management
PPTX
Dr shirish naik - Decentralized wastewater treatment systems
PPT
Dr. S. Neelamani - Scrap tires as wave barriers in the marine environmnet ana...
PPTX
Dr. Faten Al-Attar - Green building and waste management
PPT
Dr. Ahmad Abdul Hay Agwa - Offshore drilling waste treatments & risk manageme...
PDF
Dr. Abdul Rehman Khan - Rehabilitation of an industrial mercury contaminated ...
PDF
Dr. Ziyad Salloum - Geographical Passwords
PPTX
Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1
ورقة عمل المؤتمر الخليجي الثاني بالكويت تقديم دكتور عنتر سليمان
دور التدريب فى تحقيق الميزة التنافسية محمد عمرو صادق
إنجح في التوظيف ميلاد حدشيتي
الكوتشنج الوظيفي مؤتمر الموارد البشرية الخليجي- أحمد مجدي
2د. محمد كمال
د. محمد كمال
وليد حمود ورقة الأمانة العامة
محمد العوفي - تنمية الموارد البشرية الخليجية كمدخل استراتيجي لتحقيق ثروة
أمل الرشدان -التحسين المستمر بروميديا
بناء الثقافة الوظيفية - محمد كمال
Eng. salman zafar - Concept of zero wastes and role of material recovery faci...
مؤتمر النفايات
Eng. ch. rama krushna chary drilling waste management
Dr shirish naik - Decentralized wastewater treatment systems
Dr. S. Neelamani - Scrap tires as wave barriers in the marine environmnet ana...
Dr. Faten Al-Attar - Green building and waste management
Dr. Ahmad Abdul Hay Agwa - Offshore drilling waste treatments & risk manageme...
Dr. Abdul Rehman Khan - Rehabilitation of an industrial mercury contaminated ...
Dr. Ziyad Salloum - Geographical Passwords
Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

Recently uploaded (20)

PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Approach and Philosophy of On baking technology
PPTX
A Presentation on Artificial Intelligence
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Mushroom cultivation and it's methods.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
August Patch Tuesday
PDF
Encapsulation theory and applications.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Encapsulation_ Review paper, used for researhc scholars
1 - Historical Antecedents, Social Consideration.pdf
cloud_computing_Infrastucture_as_cloud_p
Hindi spoken digit analysis for native and non-native speakers
Approach and Philosophy of On baking technology
A Presentation on Artificial Intelligence
Unlocking AI with Model Context Protocol (MCP)
DP Operators-handbook-extract for the Mautical Institute
Mushroom cultivation and it's methods.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
A novel scalable deep ensemble learning framework for big data classification...
Assigned Numbers - 2025 - Bluetooth® Document
Chapter 5: Probability Theory and Statistics
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
SOPHOS-XG Firewall Administrator PPT.pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
August Patch Tuesday
Encapsulation theory and applications.pdf
WOOl fibre morphology and structure.pdf for textiles

Dr. Basel Al - Othman - Live mobilehacking

  • 1. Live Mobile Hacking Basel Alothman •PhD Researcher in DeMontfort University, Leicester UK. •MSc in Computer Science, University of Hertfordshire, UK,2013. •BSc in Computing & Information System, University of Dubai, UAE, 2011. •CeM112685 (Certified e-Marketer from e-Marketing Association) •CPTE 5601 (Certified Penetration Testing Engineer from mile2) •LPT (Licensed Penetration Tester) •ECSA ECC-26988904 (EC-Council Certified Security Analyst) •CEH ECC-26853113 (Certified Ethical Hacker from EC-Council) •ISSA Membership #3138043 •ISACA Membership -London Chapter -#786192 •BSC Membership #990431538 •AoIR Membership (Basil Alothman)
  • 3. Why the hackers want to hack you?  Steal your passwords.  Steal your photos/picture  Steal your personal videos  Steal your SMS/messages  Steal your money/bank information  Know your health status  Steal any important information  Steal your contacts list  ..etc.
  • 4. How the Hackers can Hack you?  Social Engineering  Physical Attacks  Accounts Synchronizations  3rd party applications  Application permission  Jailbreak, rooting  Malware
  • 6. How to create strong Password? 1. Hide your password in safe place. 2. Create more than 7 character (numbers, letters and code($#!^&). 3. Choose between capital and small letters. 4. Avoid common password like abcd 12345 5. Avoid the words used in dictionary 6. Change your password between time to time Ex: H@cKeRs582
  • 7. How they steal data with less than 2 min?  Fake Charger  Automatic Back-up System  Cloud Computing Syncronization
  • 8. What is Smartphone Malware?  Smartphone Malware  GooglePlay is not safe to download application (Some application are malicious it might steal your data, spy on your hardware feature…etc.).  Application Permission vulnerabilities.  Application Permission update.  Apps Review.
  • 9. How to protect your self/family/mobile from getting hacked?  Stealing Device:  Secure your “Lock Screen”.  Install trace phone application and try now.  Stealing Data:  Don’t share any personal information (maybe today is not important but tomorrow not.  Check your cloud computing synchronization.  Check your social networks synchronization.  Check your installed application and sign-out and delete those which are not trusted application.