What Can Someone Do With My Phone Number

Boris Johnson's personal telephone number has been publicly available on the cyberspace for 15 years, it has been revealed. Listed at the bottom of a 2006 press release, the number has reportedly been accessible online from the time the prime minister was shadow higher educational activity minister through to his rise to Number 10.

That such a loftier-value mobile number has been publicly available for and so long has raised cybersecurity concerns. If hostile states had admission to the number, it's possible they could take used information technology to spy on the prime number minister. That would pose a serious security risk to the Britain.

Hackers and cybercriminals place a high premium on our mobile telephone numbers – with which they can do a lot of damage with very little effort. While in that location is currently no show that Boris Johnson's data and communications have been compromised, having your mobile telephone number being freely available significantly increases your vulnerability to cyber-attacks.

Impersonation

Ane such cyber-set on is the "SIM swap" – a very common technique that's difficult to stop. It's unremarkably used by hackers to exploit a high-value private's exposed phone number.

SIM swaps see hackers recall the victim'southward mobile phone provider, impersonating them and requesting to "port-out" the phone number to a different carrier or a new SIM card. They can use other publicly available information – such as the victim'due south date of birth and their address – to make a more than convincing case.

On completion of the port-out, the phone number activates on the aggressor's SIM card, and the hacker can ship and receive messages and make calls equally if they were the victim.

Telephone companies have been aware of this trouble for years, but the only routine solution they've come up up with is offer PIN codes that a phone owner must provide in gild to switch devices. Even this measure has proved ineffective. Hackers tin can become the codes past bribing phone visitor employees, for case.

Access

In one case hackers proceeds command of a phone number, they can then access their online profiles – on Facebook, Twitter, Gmail and WhatsApp – which are all usually linked to the mobile number. All they need to do is enquire the social media companies to send a temporary login code, via text bulletin, to the victim's telephone.

This was reported to be the case for Twitter CEO Jack Dorsey, whose mobile telephone SIM swap resulted in hackers posting offensive messages to millions of his followers. Other high-value individuals take too fallen victim to these kinds of attacks, including the actress Jessica Alba, and online personalities like Shane Dawson and Amanda Cerny.


Baca juga: The real phone hacking scandal is in your pocket


Aside from posting offensive messages, hackers take been reported to use the accounts to spam, steal identities, access private communications, steal cryptocurrency, and maliciously delete mobile phone data.

Surveillance

Hackers can also use another even simpler method to attack a phone – though some advanced spyware is needed to make the attack stick. Hackers armed with someone'south telephone number can ship them a text bulletin with a hyperlink inside it. If clicked, the link allows spyware to infiltrate the telephone, compromising much of its data.

Jeff Bezos stood outside, smiling and wearing a grey suit

Jeff Bezos' personal telephone was found to contain spyware in Jan 2020. lev radin/Shutterstock

It appears this method was used to infiltrate and spy on Jeff Bezos' phone in 2020, subsequently reports found information technology to be "highly probable" that a text sent from Mohammed bin Salman, the crown prince of Saudi arabia, delivered the spyware to Bezos' telephone. Similar spyware has been used to monitor the phones of journalists and human rights activists.

It is possible that Boris Johnson'south mobile phone has never been hacked, in spite of the 15 years that his number was freely bachelor online. However, seeing as the exposed telephone numbers of loftier-value individuals tin exist taken advantage of by criminals or hackers from hostile states, tight new security measures should be put in place to avert such an oversight happening once more.

grossvenswithe.blogspot.com

Source: https://theconversation.com/boris-johnsons-phone-what-can-hackers-do-with-your-mobile-number-160126

0 Response to "What Can Someone Do With My Phone Number"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel