In the digital economy since the 1990s the internet started to boom, cell phone technology transformed to smartphones. Modern smartphones, regardless of iOS power or Android OS based, are the de facto world standard. As more and more people use smartphones and as you can see, its sales are outperforming the traditional pc and even gaming revenue alone. Whatever is the new mobile wallet application and to store credit card and use smartphone to make payment. We use the smartphone also for the whatsapp-like messaging, facebook (now metaverse) social website, browsing website and making payment, and even with mobile banking applications installed.
Since it is a GPS device, it has become a very important modern tool most people will carry all the time. Which makes it even more handy to track, compared with the traditional computer.
You will be surprised to know that, besides those smartphone hackers who attempt to make spyware embedded into mobile applications and want you to install it into your smartphone, a lot of the countries’ governments are the heavy users for performing the same, whether you are aware of it or not.
Tools to spy on private messages and contacts of the targeted devices is highly on demand, and it heavy trade, since if country is the user, they have “lawful interception” power to command all the internet service provider (ISP) to collaborate for the “silent and hidden lawful interception” behind the scene.
Anti-surveillance activists keep demanding to crack down those tools on human rights and civil rights, but most of the people are never aware, the country and nation by itself is the biggest buyer for those tools and have it deployed in the various “lawful inception” channels.
Without doubt all country governments have the interest to spy on journalists, activists, and dissidents, and do it as stealthily as possible in the backend. When you come across something mentioned like a maker of “lawful interception” technologies and services including voice, data collection and “tracking systems’ ‘, you must know what it really means. Hacking tool is a two edged sword, depending on who uses it and for what kind of purpose.
For a company, it is important for you to perform no mere vulnerability assessment, but hacking attempts with those hacking tools to attempt to determine how much things can be found out from your enterprise networks, and work backward to make it hard to do so, that the whole purpose for performing penetration testing is about. You need to know the difference among companies who merely perform vulnerability assessment via the various automated scanners and compare with ethical hackers who focus on penetrating your system, and good to know the attack path they are taking and perform for the cyberdefense action based on their report.
E-SPIN Group in the enterprise ICT solution supply, consultancy, project management, training and maintenance for corporation and government agencies did business across the region and via the channel. Feel free to contact E-SPIN for your project requirement and inquiry.
Other post you may be interest: