Warning over ‘James Bond’ mobile spying devices

Software is available you can install and use to track everything that is going on with a mobile phone.

Matrix men

The biggest real-world problems when it comes to smartphone security are not viruses, but spying tools.

So claims security firm F-Secure, which believes that there are many companies selling spying products for smartphones like the iPhone and BlackBerry, and which users could install on other people's devices.

Mikko Hyponnen, chief security researcher for F-Secure, said that once installed, you could fully monitor what a person was doing on their phone.

"We've tried it out and it works like a charm. You can log someone's phone calls, the number, how long they talked," he said.

"If they sent text messages you can find full information about when they sent the message, who received it and the actual content of it."

To fit these spying tools you need to have physical access to somebody else's phone, although the researcher said it would only take a minute to a minute-and-a-half to install.

F-Secure said that the cases it investigated typically weren't really to do with espionage, but rather cases like a jealous wife or husband looking to monitor their spouse.

"With the modern phones you know exactly where it is. If you have GPS you get the exact location," Hyponnen said.

"You can also remotely turn on the microphone and listen to what's being discussed in the room."

In military bases, people are often asked to remove their battery in case there is a listening device inside.

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Security best practices for PostgreSQL

Securing data with PostgreSQL

Download now

Transform your MSP business into a money-making machine

Benefits and challenges of a recurring revenue model

Download now

The care and feeding of cloud

How to support cloud infrastructure post-migration

Watch now

Recommended

How to encrypt files and folders in Windows 10
encryption

How to encrypt files and folders in Windows 10

9 Apr 2021
The definitive guide to IT security
Whitepaper

The definitive guide to IT security

9 Apr 2021
Evidence suggests REvil behind Harris Federation ransomware attack
ransomware

Evidence suggests REvil behind Harris Federation ransomware attack

9 Apr 2021
Fujitsu taps Trend Micro to secure private 5G networks in smart factories
5G

Fujitsu taps Trend Micro to secure private 5G networks in smart factories

8 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
Hackers are using fake messages to break into WhatsApp accounts
instant messaging (IM)

Hackers are using fake messages to break into WhatsApp accounts

8 Apr 2021
Alienware’s new gaming laptop is a kick in the teeth for Intel’s new CEO
Hardware

Alienware’s new gaming laptop is a kick in the teeth for Intel’s new CEO

8 Apr 2021