SlideShare a Scribd company logo
7
Most read
8
Most read
15
Most read
Cyber Crime
(Mobile Phone Data
Hacking)
Presented by
Md Abu Syeem
Introduction
Threat types
Threat description
Conclusion
Q/A
Agenda
Mobile phone Data Hacking
smartphone
a mobile phone that performs many of the
functions of a computer, typically having a
touchscreen interface, Internet access, an
operating system capable of running
downloaded apps and storage
Mobile phone Data Hacking
All major cellular networks
support
• Voice calls
• Voice mail (VM)
• Short Message Service (SMS)
• Location-based Services (LBS)
• IP Connectivity
Email
Circuit Switching-Paging effect
Packet Switching-GGSN(Gateway GPRS
support node) SGSN(Serving GPRS support
node) (CDR-Call Detail Record)
Communication Attack
Bluetooth Attack
1.Bluesnarfing
2.Bluebugging
3. Blue jacking
4.DOS Attack
Wi-fi:
Packet sniffing
NFC:
Near field communication
• Apps get permission to do questionable things
– Access your Address Book
– Access your location
– Make calls/Send SMS
• Apple vs. Android
– Less of an issue for Apple
• Strong requirements to get into app store
Doesn't mitigate risk entirely
– Android is a bigger risk
• Play Store is more open
People don’t always read app permissions or
understand them
Mobile phone Data Hacking
Physical Attack
Sim clone
Dock connector
lockscreen
stole
Sim clone
Dock connector
lockscreen
stole
QR code
Q/A
Mobile phone Data Hacking

More Related Content

PDF
Mobile Hacking
PDF
Risks of sharing too much personal information online
PPTX
Cyber bullying power point
PPTX
Mobile security
PPTX
Wifi hacking
PPTX
Hacking
PPTX
Phishing
PPTX
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
Mobile Hacking
Risks of sharing too much personal information online
Cyber bullying power point
Mobile security
Wifi hacking
Hacking
Phishing
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF

What's hot (20)

PPSX
Cyber security awareness for students
PPTX
Social engineering
PPTX
Social engineering
PDF
What is Social Engineering? An illustrated presentation.
PPTX
Cyberstalking
PPTX
CYBER SECURITY
PPTX
Email threats
PPTX
Cyber-Safety and Digital Citizenship
PDF
Security Awareness Training
PPTX
Phising a Threat to Network Security
PPTX
Ethical hacking presentation
PDF
Password (in)security
PPTX
Cyber Security Presentation "It Will Never Happen To Me"
PPTX
Social engineering
PPT
Consumer Privacy
PDF
Cyber security awareness presentation nepal
PDF
Android Hacking
PPTX
Mobile Phone and SIM card cloning
PDF
Cyber security awareness for students
PPTX
Cyber crime ppt
Cyber security awareness for students
Social engineering
Social engineering
What is Social Engineering? An illustrated presentation.
Cyberstalking
CYBER SECURITY
Email threats
Cyber-Safety and Digital Citizenship
Security Awareness Training
Phising a Threat to Network Security
Ethical hacking presentation
Password (in)security
Cyber Security Presentation "It Will Never Happen To Me"
Social engineering
Consumer Privacy
Cyber security awareness presentation nepal
Android Hacking
Mobile Phone and SIM card cloning
Cyber security awareness for students
Cyber crime ppt

Viewers also liked (20)

PPTX
Hacking Mobile Apps
PDF
Hacking Android OS
PDF
Growth Hacking For Mobile - Hack 2 Validate & Hack 2 Grow
PPTX
Android Hacking + Pentesting
PDF
The art of android hacking
PPTX
Hacking ppt
PPTX
Hacking & its types
PPT
Computer&Internet Safety Digital Story
PPTX
Digital Etiquette vhardy
PPTX
Being Smart In Cyber Space
PPT
Malware
PPT
Stay safe online
PPSX
Cyber Crime: Stay Safe Online
PPTX
Big data ... for security
PDF
Discovering Google Secrets
PPTX
App Store Optimization Basics - Ola k ASO en Congreso SEOparaSEOs 2013
PPTX
Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
PPTX
password cracking and Key logger
PDF
SECQME Watch Over Me Deck 2014
PDF
Big data and cyber security legal risks and challenges
Hacking Mobile Apps
Hacking Android OS
Growth Hacking For Mobile - Hack 2 Validate & Hack 2 Grow
Android Hacking + Pentesting
The art of android hacking
Hacking ppt
Hacking & its types
Computer&Internet Safety Digital Story
Digital Etiquette vhardy
Being Smart In Cyber Space
Malware
Stay safe online
Cyber Crime: Stay Safe Online
Big data ... for security
Discovering Google Secrets
App Store Optimization Basics - Ola k ASO en Congreso SEOparaSEOs 2013
Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
password cracking and Key logger
SECQME Watch Over Me Deck 2014
Big data and cyber security legal risks and challenges

Similar to Mobile phone Data Hacking (20)

PDF
Les 10 risques liés aux applications mobiles
PPT
The Consumerisation of Corporate IT
PDF
Can You Steal From Me Now? Mobile and BYOD Security Risks
PPT
MOBILE SECURITY -UNIT -II PPT IV- PROFESSIONAL ELEFCTIVE
PDF
(Pptx) yury chemerkin hacker_halted_2013
PDF
(Pdf) yury chemerkin hackfest.ca_2013
PDF
(Pdf) yury chemerkin hacktivity_2013
PPTX
Securing hand held computing devices
PPT
Android vulnerability study
PPTX
5G mission diary: Houston, we have a problem
PDF
Defcon 22-weston-hecker-burner-phone-ddos
PPTX
CS_UNIT 2(P3).pptx
PPTX
ANDROID SECURITY
DOCX
Wireless Security and Mobile DevicesChapter 12Princi.docx
PPTX
Security Issues for Cellular Telephony
PPT
Mobile Device Security
PPTX
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
PDF
why-your-network-needs-an-sbc-guide.pdf
PPT
cellphone virus and security
PPT
Event - Internet Thailand - Total Security Perimeters
Les 10 risques liés aux applications mobiles
The Consumerisation of Corporate IT
Can You Steal From Me Now? Mobile and BYOD Security Risks
MOBILE SECURITY -UNIT -II PPT IV- PROFESSIONAL ELEFCTIVE
(Pptx) yury chemerkin hacker_halted_2013
(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hacktivity_2013
Securing hand held computing devices
Android vulnerability study
5G mission diary: Houston, we have a problem
Defcon 22-weston-hecker-burner-phone-ddos
CS_UNIT 2(P3).pptx
ANDROID SECURITY
Wireless Security and Mobile DevicesChapter 12Princi.docx
Security Issues for Cellular Telephony
Mobile Device Security
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
why-your-network-needs-an-sbc-guide.pdf
cellphone virus and security
Event - Internet Thailand - Total Security Perimeters

Mobile phone Data Hacking