Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Install
Faster access than browser!
 

Phone hacking

Index Phone hacking

Phone hacking is the practice of manipulating or gaining unauthorized access to mobile phones, such as by intercepting telephone calls or accessing voicemail messages. [1]

48 relations: A5/1, Ars Technica, AT&T, BBC News, Bluesnarfing, Bluetooth, British royal family, Brute-force attack, Call centre, Caller ID spoofing, CNET, CNN, Glenn Mulcaire, IPhone, Kevin Mitnick, Key space (cryptography), Landline, Law of the United States, Lawful interception, Malware, Mobile phone, Mobile security, MSNBC, Murder of Milly Dowler, National Institute of Standards and Technology, New Scientist, News International phone hacking scandal, News of the World, Operation Weeting, Password strength, Personal identification number, Phreaking, Regulation of Investigatory Powers Act 2000, Rory Cellan-Jones, Sky News, Social engineering (security), Sophos, Surveillance, T-Mobile, Telephone company, Telephone tapping, The Guardian, The New York Times, The Sydney Morning Herald, The Wall Street Journal, Truth in Caller ID Act of 2009, Voicemail, 2G.

A5/1

A5/1 is a stream cipher used to provide over-the-air communication privacy in the GSM cellular telephone standard.

New!!: Phone hacking and A5/1 · See more »

Ars Technica

Ars Technica (a Latin-derived term that the site translates as the "art of technology") is a website covering news and opinions in technology, science, politics, and society, created by Ken Fisher and Jon Stokes in 1998.

New!!: Phone hacking and Ars Technica · See more »

AT&T

AT&T Inc. is an American multinational conglomerate holding company headquartered at Whitacre Tower in Downtown Dallas, Texas.

New!!: Phone hacking and AT&T · See more »

BBC News

BBC News is an operational business division of the British Broadcasting Corporation (BBC) responsible for the gathering and broadcasting of news and current affairs.

New!!: Phone hacking and BBC News · See more »

Bluesnarfing

Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs (personal digital assistant).

New!!: Phone hacking and Bluesnarfing · See more »

Bluetooth

Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485GHz) from fixed and mobile devices, and building personal area networks (PANs).

New!!: Phone hacking and Bluetooth · See more »

British royal family

The British royal family comprises Queen Elizabeth II and her close relations.

New!!: Phone hacking and British royal family · See more »

Brute-force attack

In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly.

New!!: Phone hacking and Brute-force attack · See more »

Call centre

A call centre or call center is a centralised office used for receiving or transmitting a large volume of requests by telephone.

New!!: Phone hacking and Call centre · See more »

Caller ID spoofing

Caller ID spoofing is the practice of causing the telephone network to indicate to the receiver of a call that the originator of the call is a station other than the true originating station.

New!!: Phone hacking and Caller ID spoofing · See more »

CNET

CNET (stylized as c|net) is an American media website that publishes reviews, news, articles, blogs, podcasts and videos on technology and consumer electronics globally.

New!!: Phone hacking and CNET · See more »

CNN

Cable News Network (CNN) is an American basic cable and satellite television news channel and an independent subsidiary of AT&T's WarnerMedia.

New!!: Phone hacking and CNN · See more »

Glenn Mulcaire

Glenn Michael Mulcaire (born 8 September 1970) is an English private investigator and former non-league footballer.

New!!: Phone hacking and Glenn Mulcaire · See more »

IPhone

iPhone is a line of smartphones designed and marketed by Apple Inc. The iPhone line of products use Apple's iOS mobile operating system software.

New!!: Phone hacking and IPhone · See more »

Kevin Mitnick

Kevin David Mitnick (born August 6, 1963) is an American computer security consultant, author, and hacker, best known for his high-profile 1995 arrest and later five years in prison for various computer and communications-related crimes.

New!!: Phone hacking and Kevin Mitnick · See more »

Key space (cryptography)

In cryptography, an algorithm's key space refers to the set of all possible permutations of a key.

New!!: Phone hacking and Key space (cryptography) · See more »

Landline

A landline telephone (also known as land line, land-line, main line, home phone, landline, fixed-line, and wireline) is a phone that uses a metal wire or optical fiber telephone line for transmission as distinguished from a mobile cellular line, which uses radio waves for transmission.

New!!: Phone hacking and Landline · See more »

Law of the United States

The law of the United States comprises many levels of codified and uncodified forms of law, of which the most important is the United States Constitution, the foundation of the federal government of the United States.

New!!: Phone hacking and Law of the United States · See more »

Lawful interception

Lawful interception (LI) refers to the facilities in telecommunications and telephone networks that allow law enforcement agencies with court order or other legal authorization to selectively wiretap individual subscribers.

New!!: Phone hacking and Lawful interception · See more »

Malware

Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.

New!!: Phone hacking and Malware · See more »

Mobile phone

A mobile phone, known as a cell phone in North America, is a portable telephone that can make and receive calls over a radio frequency link while the user is moving within a telephone service area.

New!!: Phone hacking and Mobile phone · See more »

Mobile security

Mobile security, or more specifically mobile device security, has become increasingly important in mobile computing.

New!!: Phone hacking and Mobile security · See more »

MSNBC

MSNBC is an American news cable and satellite television network that provides news coverage and political commentary from NBC News on current events.

New!!: Phone hacking and MSNBC · See more »

Murder of Milly Dowler

On 21 March 2002, Amanda Jane "Milly" Dowler, a 13-year-old English schoolgirl, was reported missing by her parents after failing to return home from school and not being seen since walking along Station Avenue in Walton-on-Thames, Surrey, that afternoon.

New!!: Phone hacking and Murder of Milly Dowler · See more »

National Institute of Standards and Technology

The National Institute of Standards and Technology (NIST) is one of the oldest physical science laboratories in the United States.

New!!: Phone hacking and National Institute of Standards and Technology · See more »

New Scientist

New Scientist, first published on 22 November 1956, is a weekly, English-language magazine that covers all aspects of science and technology.

New!!: Phone hacking and New Scientist · See more »

News International phone hacking scandal

The News International phone-hacking scandal is a controversy involving the now defunct News of the World and other British newspapers published by News International, a subsidiary of News Corporation.

New!!: Phone hacking and News International phone hacking scandal · See more »

News of the World

The News of the World was a national red top newspaper published in the United Kingdom from 1843 to 2011.

New!!: Phone hacking and News of the World · See more »

Operation Weeting

Operation Weeting is a British police investigation that commenced on 26 January 2011, under the Specialist Crime Directorate of the Metropolitan Police Service into allegations of phone hacking in the ''News of the World'' phone hacking affair.

New!!: Phone hacking and Operation Weeting · See more »

Password strength

Password strength is a measure of the effectiveness of a password against guessing or brute-force attacks.

New!!: Phone hacking and Password strength · See more »

Personal identification number

A personal identification number (PIN, pronounced "pin"; is often spoken out loud "PIN number" by mistake) is a numeric or alpha-numeric password or code used in the process of authenticating or identifying a user to a system and system to a user.

New!!: Phone hacking and Personal identification number · See more »

Phreaking

Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks.

New!!: Phone hacking and Phreaking · See more »

Regulation of Investigatory Powers Act 2000

The Regulation of Investigatory Powers Act 2000 (c.23) (RIP or RIPA) is an Act of the Parliament of the United Kingdom, regulating the powers of public bodies to carry out surveillance and investigation, and covering the interception of communications.

New!!: Phone hacking and Regulation of Investigatory Powers Act 2000 · See more »

Rory Cellan-Jones

Nicholas Rory Cellan-Jones (17 January 1958; "Cellan" pronounced) is a British journalist for BBC News, specialising in economics and technology.

New!!: Phone hacking and Rory Cellan-Jones · See more »

Sky News

Sky News is a 24-hour international multimedia news organisation based in the UK that started as a 24-hour television news channel.

New!!: Phone hacking and Sky News · See more »

Social engineering (security)

Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information.

New!!: Phone hacking and Social engineering (security) · See more »

Sophos

Sophos Group plc is an English security software and hardware company.

New!!: Phone hacking and Sophos · See more »

Surveillance

Surveillance is the monitoring of behavior, activities, or other changing information for the purpose of influencing, managing, directing, or protecting people.

New!!: Phone hacking and Surveillance · See more »

T-Mobile

T-Mobile is the brand name used by the mobile communications subsidiaries of the German telecommunications company Deutsche Telekom AG.

New!!: Phone hacking and T-Mobile · See more »

Telephone company

A telephone company, also known as a telco, telephone service provider, or telecommunications operator, is a kind of communications service provider (CSP) (more precisely a telecommunications service provider or TSP) that provides telecommunications services such as telephony and data communications access.

New!!: Phone hacking and Telephone company · See more »

Telephone tapping

Telephone tapping (also wire tapping or wiretapping in American English) is the monitoring of telephone and Internet conversations by a third party, often by covert means.

New!!: Phone hacking and Telephone tapping · See more »

The Guardian

The Guardian is a British daily newspaper.

New!!: Phone hacking and The Guardian · See more »

The New York Times

The New York Times (sometimes abbreviated as The NYT or The Times) is an American newspaper based in New York City with worldwide influence and readership.

New!!: Phone hacking and The New York Times · See more »

The Sydney Morning Herald

The Sydney Morning Herald (SMH) is a daily compact newspaper published by Fairfax Media in Sydney, Australia.

New!!: Phone hacking and The Sydney Morning Herald · See more »

The Wall Street Journal

The Wall Street Journal is a U.S. business-focused, English-language international daily newspaper based in New York City.

New!!: Phone hacking and The Wall Street Journal · See more »

Truth in Caller ID Act of 2009

Caller ID spoofing is generally illegal in the United States if done "with the intent to defraud, cause harm, or wrongfully obtain anything of value".

New!!: Phone hacking and Truth in Caller ID Act of 2009 · See more »

Voicemail

A voicemail system (also known as voice message or voice bank) is a computer-based system that allows users and subscribers to exchange personal voice messages; to select and deliver voice information; and to process transactions relating to individuals, organizations, products and services, using an ordinary telephone.

New!!: Phone hacking and Voicemail · See more »

2G

2G (or 2-G) is short for second-generation cellular technology.

New!!: Phone hacking and 2G · See more »

Redirects here:

Voicemail hacking.

References

[1] https://en.wikipedia.org/wiki/Phone_hacking

OutgoingIncoming
Hey! We are on Facebook now! »