Intro

<p></p> <p>Smartphones aren't the prime target of virus writers yet. Hackers are ramping up their efforts, however, unleashing a variety of attacks that specifically target smartphone owners.</p> <p>"We've noticed a 900 percent increase of malware for mobile devices that run the Android OS," in the past year, said Catalin Cosoi, global research director at Bucharest, Romania security firm Bitdefender. "Although some of the samples are oriented towards profit, by sending text messages or phoning to premium-rate numbers, the wide majority [are] focused on extracting personal information from the device, such as contacts, text messages, browser history and GPS location."</p> <p>Here are the top 10 terrible threats that smartphone owners should be aware of. Click 'next' on the upper right to proceed.</p> <p></p>

<strong>Smishing:</strong>

<p> A short text-messaging variation on phishing attacks, <a alt="((CONLINK|6692|smishing))" href="http://www.technewsdaily.com/6692-crooks-call-up-new-phone-scams-to-steal-your-money.html">smishing</a> uses text messages to trick victims into calling a fake bank or credit card company and divulging his or her account number and password, under the pretext of needing to confirm a purchase or update security settings. When the customer calls the texted number, a voicemail system set up by the cybercrook records the account number and password.</p> <p></p>

<strong>War Texting:</strong>

<p> First demonstrated on connected car systems, such as GM's OnStar, that allow owners to remotely unlock or start their vehicles, <a alt="((CONLINK|7026|war%20texting))" href="http://www.technewsdaily.com/7026-text-message-hacks-car.html">war texting</a> is a hacking technique that sniffs out the codes used to communicate between a smartphone and a car. Once the codes have been uncovered, the hacker can unlock and start the vehicle without a key. In some cases, the criminal may also be able to track the car if someone else is driving it.</p> <p></p>

<strong>Wi-Fi Hijacking:</strong>

<p> Everyone wants a free ride, so some hackers set up <a alt="((CONLINK|1421|free%20Wi-Fi%20hotspots))" href="http://www.technewsdaily.com/1421-browser-plugin-makes-wi-fi-hacking-easy.html">free Wi-Fi hotspots</a> in public places such as parks, cafes and airports. Unsuspecting users who log onto the hot spot are then monitored for passwords, credit card numbers and account information.</p> <p></p>

<strong>Open Hot Spot:</strong>

<p> Conversely, many smartphone owners use their own phones to create an instant hot spot so that their laptops can get online. That's fine, as long as one creates a <a alt="((CONLINK|2347|strong%20password))" href="http://www.technewsdaily.com/2347-how-to-create-remember-super-secure-passwords.html">strong password</a> requirement (letters and numbers) to sign into the hot spot. Otherwise, hackers may be able to gain instant access to your connection and your communications.</p> <p></p>

<strong>Baseband Hacking:</strong>

<p> A sophisticated method of intercepting cellular calls, <a alt="((CONLINK|6536|baseband%20hacking))" href="http://www.technewsdaily.com/6536-new-hack-turns-cell-phones-into-spying-devices.html">baseband hacking</a> exploits vulnerabilities in the chips and firmware used in both iPhones and Android-based smartphones. Such attacks use the phone's baseband processor to turn it into a listening device that allows the intruder to eavesdrop on conversations. However, it requires knowledge of the firmware in these phones, as well as setting up a temporary cellular node (essentially, a fake cellular tower).</p> <p></p>

<strong>Bluetooth Snooping:</strong>

<p> Bluetooth device-pairing default passcodes for smartphones are usually "0000" or "1234." For convenience's sake, many users never change the defaults; that's a mistake that can give an attacker access to all your messages and contacts. Additional Bluetooth attacks have also been demonstrated so-called "fuzzing" attacks that overwhelm and crash a device using Bluetooth signals.</p> <p></p>

<strong>Hidden URLs:</strong>

<p> Text messages, Facebook postings and Twitter tweets are rife with <a alt="((CONLINK|6914|shortened%20URLs))" href="http://www.technewsdaily.com/6914-how-to-dodge-dangers-shortened-web-links.html">shortened URLs</a> , thanks to services such as Bit.ly. Unfortunately, shortened URLs are being used to hide malicious sites and software, leading surfers astray to porn sites, spam pages and worse.</p> <p></p>

<strong>A Few Bad Apps: </strong>

<p>Back in March, a major malware infection occurred on many Android phones. Hackers used a Trojan <a alt="((CONLINK|2161|known%20as%20Droiddream))" href="http://www.technewsdaily.com/2161-infected-apps-google-android-market.html">known as Droiddream</a> and hid in it as many as 50 different rogue apps. The applications looked legitimate because the program piggybacked on real apps which were available in the official Android Market.</p> <p></p>

<strong>The One-Minute Attack:</strong>

<p> The problem with smartphones is that they are always on, which means that a smart hacker can attack quickly and get out before the victim is aware anything is wrong. That's the idea behind <a alt="((CONLINK|7194|Android.Spyware.GoneSixty.Gen))" href="http://www.technewsdaily.com/7194-android-phone-data-gone-in-60-seconds-.html">Android.Spyware.GoneSixty.Gen</a> , recently discovered by Bitdefender. Once installed on a phone, it sends all messages, recent calls, browsing history and other information to a remote location and then uninstalls itself. All this takes place in less than 60 seconds.</p> <p></p>

<strong>Message Forwarding:</strong>

<p> Simple, but effective, this is how a Florida man allegedly got hold of those <a alt="((CONLINK|7164|compromising%20pictures%20of%20Scarlett%20Johansson))" href="http://www.technewsdaily.com/7164-nude-scarlett-johansson-pics.html">compromising pictures of Scarlett Johansson</a> . A weak password one based on, say, a pet's name or a childhood address enabled him to hack into the Hollywood star's email account and then set it to automatically forward all incoming and outgoing emails to him. Researchers say hackers are now focusing on using the same technique to hack into smartphones in order to extract important corporate data and industrial secrets.</p>

The Top 10 Threats to Your Smartphone