When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Phone cloning - Wikipedia

    en.wikipedia.org/wiki/Phone_cloning

    A selection of mobile phones that can be cloned. Code-Division Multiple Access (CDMA) mobile telephone cloning involves gaining access to the device's embedded file system /nvm/num directory via specialized software or placing a modified EEPROM into the target mobile telephone, allowing the Electronic Serial Number (ESN) and/or Mobile Equipment Identifier (MEID) of the mobile phone to be changed.

  3. Phone hacking - Wikipedia

    en.wikipedia.org/wiki/Phone_hacking

    Phone hacking is the practice of exploring a mobile device, often using computer exploits to analyze everything from the lowest memory and CPU levels up to the highest file system and process levels. Modern open source tooling has become fairly sophisticated to be able to "hook" into individual functions within any running app on an unlocked ...

  4. Stingray phone tracker - Wikipedia

    en.wikipedia.org/wiki/Stingray_phone_tracker

    The standard systems are not "high power" and thus can be overpowered by secret systems using much more boosted power that can then take over a user's cell phone. If overpowered that way, a cell phone will not indicate the change due to the secret radio being programmed to hide from normal detection.

  5. Triggerfish (surveillance) - Wikipedia

    en.wikipedia.org/wiki/Triggerfish_(surveillance)

    Neither the user nor the cell phone provider need to know about Triggerfish for it to be used successfully. [2] A court order is required, but the device circumvents provisions of CALEA barring use of pen register or trap-and-trace devices. [3] The device is similar to but distinct from an IMSI catcher. [4]

  6. Cellphone surveillance - Wikipedia

    en.wikipedia.org/wiki/Cellphone_surveillance

    Cellphone surveillance (also known as cellphone spying) may involve tracking, bugging, monitoring, eavesdropping, and recording conversations and text messages on mobile phones. [1] It also encompasses the monitoring of people's movements, which can be tracked using mobile phone signals when phones are turned on. [2]

  7. Hacking of consumer electronics - Wikipedia

    en.wikipedia.org/wiki/Hacking_of_consumer...

    Hardware hacking has allowed this Nokia N9 smartphone to run with Xfce, a desktop interface on an postmarketOS, an alternative operating system. The hacking of consumer electronics is a common practice that users perform to customize and modify their devices beyond what is typically possible. This activity has a long history, dating from the ...

  8. SIM swap scam - Wikipedia

    en.wikipedia.org/wiki/SIM_swap_scam

    A SIM swap scam (also known as port-out scam, SIM splitting, [1] simjacking, and SIM swapping) [2] is a type of account takeover fraud that generally targets a weakness in two-factor authentication and two-step verification in which the second factor or step is a text message (SMS) or call placed to a mobile telephone.

  9. Mobile device forensics - Wikipedia

    en.wikipedia.org/wiki/Mobile_device_forensics

    Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence or data from a mobile device under forensically sound conditions. The phrase mobile device usually refers to mobile phones; however, it can also relate to any digital device that has both internal memory and communication ability, including PDA devices, GPS devices and tablet computers.