Anonymous

in #tecnology7 years ago

many potential exploits through the many services tied to smartphones as a supposed security-enhancing device. Examples include Facebook account hacking with just the phone number and tracking individuals within 50 meters with commercially available SS7: Locate. Track. Manipulate software. As well, with many bank accounts secured by multi-factor authentication that depends on smartphones, the security of everything smartphone-related might well need reassessment.


In 2014, security researchers in Germany demonstrated that attackers could exploit security holes in SS7 to track cell phone users' movements and communications and eavesdrop on conversations. The attack in question is essentially a man-in-the-middle attack on cell phone communications that, among other things, exploits the lack of authentication in the communication protocols that run on top of SS7.


Although the design element presents an exploitable vulnerability, it is integral to the system rather than a defect. The exposure of the SS7 vulnerabilities has demonstrated how easy it is for network operators, government and, due to the presence of exploit tools available on the Internet, even citizens to track and exploit smartphones. Used directly on a phone, SS7 attacks can surreptitiously enable location tracking, fraud, denial of service or call interception, even on GSM networks.


Interception SS7 attacks enable many potential exploits through the many services tied to smartphones as a supposed security-enhancing device. Examples include Facebook account hacking with just the phone number and tracking individuals within 50 meters with commercially available SS7: Locate. Track. Manipulate software. As well, with many bank accounts secured by multi-factor authentication that depends on smartphones, the security of everything smartphone-related might well need reassesAnonymous originated in 2003 on the imageboard 4chan, representing the concept of many online and offline community users simultaneously existing as an anarchic, digitized global brain.[4][5][6] Anonymous members (known as "Anons") can be distinguished in public by the wearing of Guy Fawkes masks in the style portrayed in the graphic novel and film V for Vendetta.[7]However this may not always be the case, as some of the collective prefer to instead cover their face without using the well-known mask as a disguise.
 

In its early form, the concept was adopted by a decentralized online community acting anonymously in a coordinated manner, usually toward a loosely self-agreed goal, and primarily focused on entertainment, or often referred to as "lulz". Beginning with 2008's Project Chanology—a series of protests, pranks, and hacks targeting the Church of Scientology—the Anonymous collective became increasingly associated with collaborative hacktivism on a number of issues internationally. Individuals claiming to align themselves with Anonymous undertook protests and other actions (including direct action) in retaliation against copyright-focused campaigns by motion picture and recording industry trade associations. Later targets of Anonymous hacktivism included government agencies of the U.S., Israel, Tunisia, Uganda, and others; the Islamic State of Iraq and the Levant; child pornography sites; copyright protection agencies; the Westboro Baptist Church; and corporations such as PayPal, MasterCard, Visa, and Sony. Anons have publicly supported WikiLeaks and the Occupy movement. Related groups LulzSec and Operation AntiSec carried out cyberattacks on U.S. government agencies, media, video game companies, military contractors, military personnel, and police officers, resulting in the attention of law enforcement to the groups' activities. Some actions by members of the group have been described as being anti-Zionist. It has threatened to cyber-attack Israel and engaged in the "#OpIsrael" cyber-attacks of Israeli websites on Yom HaShoah (Holocaust Remembrance Day) in 2013.[8]
 

Dozens of people have been arrested for involvement in Anonymous cyberattacks, in countries including the US, UK, Australia, the Netherlands, Spain, India and Turkey. Evaluations of the group's actions and effectiveness vary widely. Supporters have called the group "freedom fighters"[9] and digital Robin Hoods[10] while critics have described them as "a cyber lynch-mob"[11] or "cyber terrorists".[12] In 2012, Time called Anonymous one of the "100 most influential people" in the world.[13]
many 

Sort:  

Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:
https://www.youtube.com/watch?v=waITF4K1geE