Δευτέρα 22 Αυγούστου 2016

Spy on Text Messages: Complete Guide

Since the popularity of text messages have significantly increased during the recent years, it has also become a popular channel for most people to exchange secret messages and engage in dubious activities. Therefore, in order to find out the truth sometimes it becomes obligatory to spy on text messages such as WhatsApp, Viber and FB Messenger. Particularly if you are a parent or an employer, it becomes your right to spy so as to investigate what is happening with your child or employee.

Popular Ways to Spy on Text Messages

The following are some of the commonly used methods to spy on text messages like as SMS, IM chat conversations and Emails.

1. Using a Spying App: The Easiest Way

Today, even though there exists a large number of mobile apps to spy on text messages, many are simply overpriced and some will never really stand up with the competition at all. However, there are a few spy apps that are really worth stating and mSpy Premium is one among them. When it comes to spying on text messages, mSpy Premium is my favorite one. In addition to SMS, this app is capable of spying on various text messaging apps like WhatsApp, Viber, Snapchat, iMessage, Skype and many more.
Spy on Text Messages
The following are some of the exciting features of mSpy Premium which makes it a perfect choice for spying on text messages:
  • Spy on call logsSMS and Contacts
  • Secretly record emails, web history and bookmarks.
  • Spy on Internet activity including social media like FacebookTwitter and Gmail.
  • Spy on text messaging apps like WhatsApp, iMessage, Viber, Snapchat, Skype, LINE and more.
  • Track GPS locations in real-time.
  • Record keystrokes, photos and videos.
  • Operates in a complete stealth mode and remains undetected!.
For parents and employers, mSpy Premium can offer an additional help as it supports a handful of control features as well:
  • Block access to unwanted apps and calls.
  • Remotely lock the phone or restrict its usage.
  • Remotely delete unwanted contacts, call logs, SMS and photos if desired.
  • Get instant alerts when profane language is typed or viewed.

Watch mSpy Premium Demo

You can take a look at the live demo of mSpy Premium in action from the following link:

How it Works?

After you order mSpy Premium you will need to install the app onto the target phone which will only take 2-3 minutes to complete. If you need any assistance, the support team is ready to help you out any time you need.
Once the installation is complete, all of the recorded text messages and data will show on your online dashboard which can be accessed from any web browser across the world as shown in the demo.

Compatible Phones: Android, BlackBerry, iPhone, iPad, Windows Mobile and Tablets.

2. Using a SIM Card Reader to Recover Text Messages

If you can’t really afford a spying app, you can buy a cheap SIM card reader from the market and use the target person’s SIM to recover text messages, phone contacts and email addresses stored on it. This can be done using the following steps:
  1. Switch Off the target phone and remove the SIM card from it.
  2. Insert the SIM card into the SIM card reader and plug-in the SIM card reader to the USB port on your personal computer.
  3. If your SIM card comes with a software CD/DVD, install it on your computer. This will help you recover any of the stored text messages from the SIM and store it on your PC for later review.
It is needless to mention that this method has clear drawbacks as there are chances of text messages from being deleted from the SIM before you get access to it. Also this method can only recover SMS (stored on SIM) and not other text messages from messaging apps like as WhatsApp, Viber, Snapchat etc.
Therefore to overcome this drawback I still recommend the usage of spying app like mSpy Premium to spy on text messages.

Car Thieves Can Unlock 100 Million Volkswagens With A Simple Wireless Hack


 IN BRIEF

Some 100 Million cars made by Volkswagen are vulnerable to a key cloning attack that could allow thieves to unlock the doors of most popular cars remotely through a wireless signal, according to new research.

Next time when you leave your car in a parking lot, make sure you don't leave your valuables in it, especially if it's a Volkswagen.



What's more worrisome?

The new attack applies to practically every car Volkswagen has sold since 1995.

There are two distinct vulnerabilities present in almost every car sold by Volkswagen group after 1995, including models from Audi, Skoda, Fiat, Citroen, Ford and Peugeot.

Computer scientists from the University of Birmingham and the German engineering firm Kasper & Oswald plan to present their research [PDF] later this week at the Usenix security conference in Austin, Texas.

Attack 1 — Using Arduino-based RF Transceiver (Cost $40)


The first attack can be carried out using a cheap radio device that can be made for just $40 with a small control board and a radio receiver, but is capable of eavesdropping and recording the rolling code values used by keyless entry systems.

The code values are included in the signal sent every time a driver presses the key fob’s buttons, which is then used together to emulate a key that is unique to every vehicle.

The researchers then managed to reverse engineer one component inside a Volkswagen's network and were able to extract a cryptographic key that is shared among millions of Volkswagen vehicles.

Now, combining the two supposedly secret keys, the researchers were able to clone the key fob and access to the car.
"With the knowledge of these keys, an adversary only has to eavesdrop a single signal from a target remote control," the researchers wrote in their paper. "Afterwards, he can decrypt this signal, obtain the current UID and counter value, and create a clone of the original remote control to lock or unlock any door of the target vehicle an arbitrary number of times."
Although the team did not reveal the components they used to extract the keys to prevent potential car hackers from exploiting the weakness.

However, they warned that if skilled hackers find and publicize those shared keys, each one could leave tens of Millions of cars vulnerable.

In past 20 years, just the four most common keys are used in all the 100 Million cars sold by Volkswagen. Only the most recent VW Golf 7 model and others that use unique keys are immune to the attack.

Attack 2 — Hijack with HiTag2 and A Radio Device in 60 Seconds


In the second attack, the team managed to attack a cryptographic scheme called HiTag2 -- decades old rolling code scheme but still used in Millions of vehicles, including Alfa Romeo, Chevrolet, Peugeot, Lancia, Opel, Renault, and Ford.

To carry out this attack, all a hacker needs is a radio setup similar to the one used in the above hack.

Using a radio device, the researchers were able to intercept and read a string of the coded signals (rolling code number that changes unpredictably with every button press) from the driver's key fob.

With the collection of rolling codes, the researchers discovered that flaws in the HiTag2 scheme would allow them to crack the cryptographic key in as little as one minute.

Since the above two attacks focus on unlocking cars rather than stealing them, the lead researcher Flavio Garcia told Wired these attacks might be combined with already exposed bugs in the HiTag2 and Megamos 'immobilizer' systems, allowing "Millions of Volkswagens and other vehicles ranging from Audis to Cadillacs to Porsches to be driven by thieves."

Also Read: RollJam — $30 Device That Unlocks Almost Any Car And Garage Door

This is not the first time this team of researchers has targeted Volkswagen, it discovered a way to start Volkswagen cars' ignitions in 2013, but had to withhold their findings for two years because VW Group threatened to sue them.

The researchers have reported the flaws to VW Group and agreed not to disclose the cryptographic keys, part numbers of vulnerable components, and how they reverse-engineered the processes.

Car hacking is a hot topic today. Recently, security researcher Benjamin Kunz Mejri disclosed zero-day flaws resided in the official BMW web domain and ConnectedDrive portal that allowed attackers totamper remotely with BMW's In-Car Infotainment System.

Previous research demonstrated hackers capabilities to hack a car remotely and control its steering and brakes and to disable car's critical functions like airbags by exploiting security bugs affecting significant automobiles.

Keeping these risks in mind, in April this year, the Michigan state Senate proposed two bills that introduce life sentences in prison for people who hack into cars’ electronic systems. Also, the FBI issued a public announcement warning people about the risks of car hacking.

So, folks, your cars are not a safe place.