All The Ways To Hack Your Phone: Phreaked Out (Episode 3)

preview_player
Показать описание

Over the course of our "Phreaked Out" series, we've seen how devices such as urban control systems, moving vehicles, and smartphones are not impervious to hacks when connected to a network—cellular or wi-fi. In our third and final episode,we check out a slate of real-time phone hacks to tackle the question of mobile phone security.

Follow MOTHERBOARD
Рекомендации по теме
Комментарии
Автор

This video was great at showing us what the risks are by using our mobile phones. What it didn't do was show us ways that we can help protect ourselves or at least beef up our security in some way, shape or form.

canadianty
Автор

I go to school with thousands of students, all connected to the same network where they have to type in the school username and password each time they arrive to get internet. So basically I could just recreate the internet, the website, and divert the data that comes through and basically I hacked thousands of students?
Uh, I'll be back in a day or two, with a degree.

Chtrerthrthrthrhtrhfdgsdfse
Автор

Definitely a few lessons learnt. Shocking that this level of hacking was so advanced when we were all relatively ignorant back in 2015. Makes one wonder how far hacking has come

lambertvanblerk
Автор

Out of the whole series this ep is best! I was a bit troubled seeing some of the earlier stuff as it was very sensational and relied on a series of ideal circumstances. What is outlined here is very real and has not been acted upon by many vendors who have left this open to guarantee a seamless user experience. Great vid!

teejuschrist
Автор

Thing is (as they showed the Vice dude visit JPMorgan's website 3:40) the modified/fake website is clearly missing the padlock and the usual green URL text that is standard for Extended Validation SSL certificates. But it still proves a point and it's really interesting.

midas
Автор

i love that you can see each program they were using!

madprofessor
Автор

I never use my phone for anything too personal, like i never use it for anything banking or i keep certain info separate from it. If I even buy a game online I use the prepaid cards to do it.
I've been poked fun at for some of the precautions I take but I'm the one sleeping good at night knowing I'm probably ok.

derealized
Автор

I keep telling people this when they are in the public with their laptop and tablets. One person response was that they do not know about that stuff. Your ignorance is a hackers strength, video's such as these open our eyes and that makes it harder for the hackers to hack us. Thank you.

jnicoulakos
Автор

This series of videos has gotten better and better. This episode was excellent. The first one was rather boring. Nice work.

machtturbo
Автор

I love how a video made to raise awareness about illegal hacking has become an advertisement for hacker sites. LOL

olakolade
Автор

I love that they are talking about IOT and now we are there.

Cfomodz
Автор

I've been in the industry for over 35 years and have held a basic premise about technology since early in my career.
Anything that can be done with technology, can be undone with technology. Anything you can make with technology, you can break with technology.
When I first told this to the government people using tech that they thought was secure, they laughed at me. They aren't laughing now.

gecsus
Автор

For those wondering, WireShark was the software being used by Mat Solnik on 13:18

HeyitsmeCarlo
Автор

@5:00 "I'm gonna log into We're gonna see something that is hopefully not true"!!!!🤣
I'd say there is about 💯% chance of that WITHOUT a hack!

Inoculum
Автор

The kids we were too cool to even say hello to, are taking over

wandiii
Автор

interviewer: im gonna login to cnn
sammy: hopefully well see something that isnt true

kv-
Автор

This blows me away...we are not safe anywhere or anytime...I'm leaveing my phone at home never will i leave with it again

jazzskeet
Автор

If you use HTTPS connections and don't just confirm all warnings, you will realize if someone is messing with you.

pcfreak
Автор

To clarify with the banking example:  While you can re-direct pages by injecting packets, capturing regular internet traffic from banks in order to collect user information is quite hard considering that when you interface with the bank it is over an encrypted connection.  That said if one were to inject packets making the user go to a page that looked exactly like the banks homepage and asked them to enter their credentials the hacker would get your bank login information.

HankW
Автор

@motherboard great vid! its 2 years old, any chance you guys are thinking of doing an updated vid?

abelcorado
visit shbcf.ru