Friday, January 23, 2015

Your iPhones and Androids are Vulnerable to Malicious Virus Attacks according to Declassified FBI, NSA and Homeland Security Reports❗️❗️❗️


😎 An important question for YOU… Is Your  iPhone Susceptible to Cyber-Hacking… Answer: Your iPhones and Smartphones are Vulnerable to Malicious Virus Attacks according to Declassified FBI, NSA and Homeland Security Reports.



😎 Question: How susceptible is Your Smartphone to Cyber-Hacking? Truth: All smartphones are Vulnerable to Cyber Attack; however, there are steps you can take to Minimize these Threats. The Older Smartphones are more susceptible, the newer smartphones are less susceptible, but are vulnerable to attack.



























😎 Your iPhone and Smartphone are susceptible to Cyber-Hacking, rendering all of your very Personal Information, Photos, and Selfies exposed to devious folks. News Reports have exposed “Celebrity Photographs” (displayed here as Negatives) that outraged those “exposed.”



😎 Confidential Information. In recent years, the iPhone for example is capable of storing all my Bank Account Information, my Credit Cards access, my Contacts List, my Documents, my Tax Returns, my Drivers License, Insurance Cards & Policies, my Social Security Card, my Personal and Business Calendars, my eMails, my Text Messages, to name a few.



😎 My iPhone has Confidential Information as is housed in my Office’s File Cabinets. My friends have similar comprehensive information about their personal and financial matters. Some use passwords and most do not; Not using passwords is like not locking your car with goodies in your glove-boxe, and not locking your home’s Front Door exposing your family’s security, art, jewelry, cash, or not locking your Safety Deposit Box.



😎 iPhone 5S, iPhone 6, and iP,hone 6 Plus have Finger-Print Biometric Authentication, in its hardware make-up, that permits me to use a very Complex Password to back-up the FingerPrint ID. The only time I need to re-Input my complex password is when the iPhone is Turned-ON, following a hard-turn-OFF, when one holds the sleep-button for 5 seconds and Slides the OFF graphic to the Right, which I perform weekly, as a “memory cleaning” chore.



😎 Hacked Image Proliferation is due to owner’s failure to properly password protect their Smartphone, properly password protect their iCloud Account, properly password protect their iTunes Account, and promptly Update the Operating System when the manufacturer like Apple releases iOS software updaes.



😎 There are thousands of individuals globally, its been reported, spending their time creating malicious malware in attempt to Aggravating everyone. Some create malicious malware to gain intrusions to our privacy to be Annoying.



😎 Many Cyber Criminals imbed Malicious Malware, Spyware, Trojans, Worms and Viruses for more devious and devastating purposes namely: identity theft, monetary & property theft, break-ins & burglary, fraud, to mention a few.



😎 Hackers often have little problem breaking through user passwords to gain access to personal or private information, News reports revealed. This is not necessarily due to lax security measures at most web sites



😎 1 out of 5 internet users, use Passwords in the top 500 most used. In many cases, a hacker generally knows your email address or username, and then starts trying passwords from the list displayed below. If you are using one of these top 500 passwords, hackers won’t have any problem getting into your accounts. The partial-list is shown at the bottom of this Article, with a link for the 500 most used passwords.



😎 Roughly 85% of all iPhone Users are Cyber-Naked figuratively speaking, because these users do Not use any passwords whatsoever, or use very simple passwords that even a beginner Cyber-Criminal can “crack” with ease.



😎 There’s no viable rationalization for not locking your iPhone. Its like leaving your “Front Door to your home Open & Unlocked.” You would likely not use a kite-string to Lock your Front Door either, the equivalent of using a simple password.



😎 PRIMARY MEASURE – Anti-Malware practice – Use Complex PassWords. Analysts and Cyber-Criminals are shocked by the number of folks (reportedly about 60%) that don’t use any passwords to Lock their iPhones or smartphones. Also analysts and Cyber-Criminals are amazed that the 40% of the folks that use Passwords about two-thirds of them use very simple passwords. Result, 15% of users use complex passwords, 85% use simple passwords or no password whatsoever.



😎 SECOND MEASURE – Anti-Malware practice – Update your Operating System Promptly, once Apple’s iOS or Android’s Operating System Upgrades become available for DOWNLOAD. One of the primary components in Operating System Updates is the installation of the most current Anti-Malware algorithms, which is part of the iOS update. Promptly updating the iPhone’s iOS is a very effective step in minimizing Malware Attacks.



😎 THIRD MEASURE – Anti-Malware practice – ONLY Open or DownLoad Images, Videos, Attachments, Objects, eMails from known trusted Sources. Oftentimes Malware is imbedded or connected internally to eMail Attachments, or reside in Spurious Web-Sites where Worms and Trojans will wiggle into your hand-held device without you doing anything other than arrive at the Website page.



😎 Android Targeted by an astonishing 79% of all SmartPhone Malware, because it is more vulnerable to Viruses, according to U.S. Department of Homeland Security and FBI surveys. According to this survey the U.S. Department of Homeland Security and the FBI, uncovered by Public Intelligence, the majority of malware targeting mobile operating systems in 2012 was successful directly against Android devices, because its Operating System is highly fragmented rendering it more vulnerable to attack and has less Security Capability.



😎 Fragmentation of Android’s Operating System, is a major contributor to successful Malware attacks. Fragmentation generally is a phenomena where smartphone users either refuse to update, or intentionally elect not to update their smartphones’ operating system, OS, when new released are published.



😎 Most Smartphone users simply do not understand that smartphone OS updates contain Anti-Malware algorithms as well as improvements to the hand-sets’ general operation. Other smartphone users elect Not to upgrade their OS, as the Upgrade may cause their smartphone to Freeze, or many of its Apps may become inoperable.



😎 Fragmentation is Rampant with Android Users, because there are over 11,000 different android handsets models and brands in circulation, where older models do not have sufficient hardware capabilities, processors, memory, etc, to effectively install the Newer OS updates; Accordingly of Three Android users, only One-In-Three Android users update to the New Android Operating System. Conversely, TWO out of THREE Android Users do not Update periodically, therefore do NOT have the most current Anti-Malware software protection.



😎 Apple’s iPhones have some vulnerabilities too, but they were with the NSA according to a recently Declassified documents. The infamous former National Security Agency contractor Edward Snowden, responsible for leaking thousands of pages of classified intelligence documents from the NSA, the USA’s secretive spy Agency, reportedly believed that the iPhone contains “special software” that can be remotely activated by the NSA for intelligence gathering purposes.



😎 Apple was one of the first companies accused of participation in the NSA’s secret PRISM data mining initiative, following Snowden’s release of thousands of classified NSA documents. The PRISM project is said to have involved the extraction of “audio, video, photographs, e-mails, text messages, documents, and connection logs that enable analysts to track a person’s movements and contacts over time.”



😎 Apple immediately denied the accusation, saying that they “have never heard of PRISM” and that “Apple does not provide any government agency with direct access to our servers.”



😎 The “Snowden leaks” revealed that NSA had created spyware targeted at SmartPhones and iPhone, which would have given intelligence services access to SMS messages, on-board data, live microphone feeds, and GPS and WiFi location-positioning information. It remains unclear how successful the program was.



😎 Apple vehemently denied any involvement, and recently announced that its iOS software has been, and continues to be periodically updated make absolutely certain that iPhones and iPads are protected with the latest Anti-Malware software, and to assure that there are “No Back Doors for entry into one’s iPhone.”



😎 Apple Confirmed it has never worked with the NSA to create a “backdoor in any of our products, including iPhone,” the company said following news of the project. “Additionally, we have been unaware of this alleged NSA program targeting our products. We care deeply about our customers’ privacy and security.”



😎 Android’s lack of security is due to "Android Operating System Fragmentation" as more than 50% of Android users are using Older OS Versions, for fear of having their smartphones or its Apps become inoperable, even though these users are significantly more Vulernable to Viruses, Worms, Trojans, Spyware, and Malware. Newer versions of Android have become more secure, but the user-base is not updating to the new version. There are over 11,800 different Android devices in operation today. Android simply cannot keep up with their Operating System vulnerabilities, nor can the Android designers convince their users to upgrade, which would protect many of them.



😎 Security Vulnerable to Viruses, Worms, Trojans, Spyware, and Malware is Very Serious Business. These days we have more Confidential Identity information, Bank Accounts, Passwords, Emails, Test Messages, than in any other single device. Keeping our personal information safe and secure is extremely important, perhaps even more important than on our PC computers. Reports such as this among other safety concers are likely the reasons that Apple is spending millions of dollars and thousands of hardware-software engineering hours to protect its iPhone customers.



😎 According to a survey conducted by the U.S. Department of Homeland Security and the FBI and uncovered by Public Intelligence, the majority of malware targeting mobile operating systems in 2012 was intended for Android. Indeed, Android was targeted by an astonishing 79 percent of all smartphone malware. The following is an excerpt from the Unclassified report from a survey conducted by the U.S. Department of Homeland Security and the FBI.



😎 (U//FOUO) Android mobile operating system (OS) continues to be a primary target for malware attacks due to its market share and open source architecture.



😎 Industry reporting indicates 44% of Android users are still using versions 2.3.3 through 2.3.7-known as Gingerbread, which were released in 2011, and have a number of security vulnerabilities that were fixed in later versions. The growing use of mobile devices by federal, state, and local authorities makes it more important than ever to keep mobile OS patched and up-to-date. The following are some known security threats to mobile OS and mitigation steps.



😎 Android was targeted by an astonishing 79% of all smartphone malware that year far more than any other OS. The agencies found that Apple’s iOS was targeted by 0.7% of malware attacks, Windows Phone and BlackBerry by 0.3% and Symbian OS by 19%.



😎 DHS and FBI note in their memo, citing the research circulated nationwide to law enforcement, security and emergency personnel, that a significant number of Android users continue to run older versions of the OS that leave them open to a number of security vulnerabilities — something companies with rival operating systems love to point out.



😎 Recall that over 94% of Apple iOS users, about 400 million of them, have updated to the iOS7 and iOS8 which contains the latest Protection against Security Vulnerable to Viruses, Worms, Trojans, Spyware, and Malware. This is largely why Apple’s iOS has experienced less than 1% of such vulnerabilities.



😎 Most Common PassWords – the graphic below displays 200 of the Most Used PassWords – These Passwords you should never use – unless you want your site, email, and accounts hacked, as the “Bad-Guys” try these PW’s first to unlock your Smartphone.


Link takes you to the Top 500 Most Used PassWords:

http://ift.tt/1AacTGV












Pleased you’re reading, with about 75,000 readers world-wide, growing by thousands each month, giving motivation as new topics are published every day. Spread the Word to your friends, family, and associates; Forward the link below, post it on Facebook, Twitter, LinkedIn, Social Networks for their review,, Anyone may subscribe, its secure and confidential; Every time I publish an article, WordPress will send a reminder (no Ads of course) with a link to my new Article: http://ift.tt/19pAPPd




Perspective: These articles are created to inform a diverse audience, whether it be photography, digital cameras, lenses, Image editing, Apps, Smartphones, iPads, iPhones, Laptops and related products, Health & Wellness, or any news-worthy topic. The purpose is to inform, from sources that are believed to be reliable, and stimulate Dialogue.




To learn more about what else we do, take a moment and visit these links, browse around. We are pleased with over 25,900,000 visits as of January, 2015: http://www.416-1100.com .





If digital Imaging is of interest, I teach a course named "Principles of Digital Imaging and Post Image Processing" as an Adjunct Prof at FAU: http://ift.tt/19pAQ5y




When I do what I do… I usually do it here.




As a "Health Nut" for Health & Wellness; http://ift.tt/1iIfMrA




As many of my friends, family and students know, I am an avid iPad adopter since its release April, 2010. With Apple’s release of the Retina-Display iPad Air 2, (I sold iPad 4 to Gazelle.com) applied the proceeds to purchase the "mini" with 128GB of Storage, AT&T connectivity, plus added Logitech’s UltraThin Keyboard Cover, and a DECODED natural leather thin slip-over protective case.





Filed under: Android Devices, Apple iPhone and iPad News, Cyber Security, Hacking, Cyber Threats, Worms, Viruses, NEWS - Android Devices, NEWS - Cyber Security: Spyware Malware Trojans, Worms Viruses, NEWS - iPads & iPhones, NEWS - Science & Technology, NEWS - Technology - Devices, NEWS of Public Interest Tagged: Cyber Crime, Edward Snowden, FBI, Homeland Security, Malware, NSA, Password Prsotection, Spyware, Trojans, Worms



via WordPress http://ift.tt/15naOi8

No comments:

Post a Comment