Firstpost
  • Home
  • Video Shows
    Vantage Firstpost America Firstpost Africa First Sports
  • World
    US News
  • Explainers
  • News
    India Opinion Cricket Tech Entertainment Sports Health Photostories
  • Asia Cup 2025
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
Trending:
  • Charlie Kirk shot dead
  • Nepal protests
  • Russia-Poland tension
  • Israeli strikes in Qatar
  • Larry Ellison
  • Apple event
  • Sunjay Kapur inheritance row
fp-logo
Explainer: Bezos allegations put phone hacking technology in the spotlight
Whatsapp Facebook Twitter
Whatsapp Facebook Twitter
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
  • Home
  • World
  • Explainer: Bezos allegations put phone hacking technology in the spotlight

Explainer: Bezos allegations put phone hacking technology in the spotlight

Reuters • January 25, 2020, 04:11:40 IST
Whatsapp Facebook Twitter

By Raphael Satter WASHINGTON (Reuters) - Allegations that Amazon.com boss and Washington Post owner Jeff Bezos had his phone hacked by Saudi Crown Prince Mohammed bin Salman have put a spotlight on the security of smartphones and the secretive tools used to hack them. Smartphones are effectively pocket-sized computers that run apps on operating systems such as Apple’s iOS or Google’s Android

Advertisement
Subscribe Join Us
Add as a preferred source on Google
Prefer
Firstpost
On
Google
Explainer: Bezos allegations put phone hacking technology in the spotlight

Explainer: Bezos allegations put phone hacking technology in the spotlight

By Raphael Satter

WASHINGTON (Reuters) - Allegations that Amazon.com boss and Washington Post owner Jeff Bezos had his phone hacked by Saudi Crown Prince Mohammed bin Salman have put a spotlight on the security of smartphones and the secretive tools used to hack them.

Smartphones are effectively pocket-sized computers that run apps on operating systems such as Apple’s iOS or Google’s Android. Those devices have enabled a new world of connectivity - unlimited free calls over WhatsApp, for example, or an atlas worth of up-to-the-second maps from Google - but also a parade of potential security problems.

STORY CONTINUES BELOW THIS AD

Here is how smartphones can be hijacked and a look at the potential consequences and the thriving market in surveillance vendors helping the world’s spies get access to people’s secrets.

More from World
US & China reach framework agreement for TikTok US & China reach framework agreement for TikTok ‘Bullying, economic coercion’: China slams Trump pressure on Europe for 100% tariff over Russian oil ‘Bullying, economic coercion’: China slams Trump pressure on Europe for 100% tariff over Russian oil

HOW IT WORKS

Smartphones operate through a collection of apps, sometimes scores of them, running over an operating system, which in turn runs on a complex piece of hardware embedded with receptors, lenses and sensors.

Each one carries potential flaws - sometimes called bugs - that can cause a system to crash or behave unexpectedly when sent a rogue command or a malicious file. Even small openings like that can allow hackers to take control of a device. It is akin to illicitly lowering a coat hanger through a tiny seam in the car door to unlock a vehicle.

Many developers work hard to ensure those seams stay sealed, but with millions of lines of code to choose from, it is virtually impossible to guarantee total safety.

Impact Shorts

More Shorts
French MPs call for social media ban for under-15s, digital curfew for teenagers

French MPs call for social media ban for under-15s, digital curfew for teenagers

Nepal's Gen Z groups accept constitution to resolve crisis after talks with govt

Nepal's Gen Z groups accept constitution to resolve crisis after talks with govt

“There is no software that is bugless,” said Oded Vanunu, a researcher with Israeli cybersecurity firm Checkpoint who often finds flaws in popular messaging programs.

Once hackers are in, the possibilities are vast - and frightening. Anyone with full control of a smartphone can turn it into a powerful surveillance device, silently tracking users’ locations while quietly copying their emails, instant messages, photos and more.

STORY CONTINUES BELOW THIS AD

A 2015 technical document from NSO Group - one of the better known spyware vendors - outlines the capability of its Pegasus spyware programme to monitor the smallest details of a target’s life, throwing up alerts if a target enters a certain area, for example, or if two targets meet, or if a certain phone number is called.

The document, made public as part of a lawsuit against NSO by communications firm WhatsApp, shows how keystrokes can be logged, phone calls can be intercepted and a feature dubbed “room tap” uses a phone’s microphone to soak up ambient sound wherever the device happens to be.

The document says the spyware can be installed by enticing targets to click malicious links or rogue text messages, but spies particularly prize the quieter “push message” installations that remotely and invisibly install themselves on users’ phones.

WHO IT TARGETS

NSO and other spyware vendors have long argued that their products are used responsibly - only sold to governments for legitimate purposes. NSO has denied any link to the alleged Bezos hack. Saudi officials dismiss allegations of their involvement as absurd.

STORY CONTINUES BELOW THIS AD

Years of investigative work from internet watchdog group Citizen Lab - which has a well-documented record of exposing international cyber espionage campaigns - and a drumbeat of court cases and leaked documents have called such assertions as these of responsible use into question.

In October of last year messaging company WhatsApp sued NSO in California, alleging that the spyware firm had taken advantage of a bug in the app’s video calling protocol to hack 1,400 users around the world in the period between April 29 and May 10, 2019, alone.

Disclosures from other companies such as Italy’s now-defunct Hacking Team and the spyware company now known as FinSpy have also raised questions about the business. Hacking Team’s spyware was implicated in spying campaigns against dissidents in Ethiopia and the Middle East, for example, while researchers have recently found evidence that FinSpy’s software was used in Turkey.

Both companies’ tools work similarly to NSO’s — using flaws in smartphones to subvert the devices entirely.

STORY CONTINUES BELOW THIS AD

(Reporting by Raphael Satter; Editing by Howard Goller)

This story has not been edited by Firstpost staff and is generated by auto-feed.

Tags
Reuters
End of Article
Latest News
Find us on YouTube
Subscribe
End of Article

Impact Shorts

French MPs call for social media ban for under-15s, digital curfew for teenagers

French MPs call for social media ban for under-15s, digital curfew for teenagers

A French committee suggests banning social media for kids under 15 and a nighttime digital curfew for teens 15-18. The report cites concerns about TikTok's effects on minors. President Macron backs the ban, akin to Australia's proposed law.

More Impact Shorts

Top Stories

Charlie Kirk, shot dead in Utah, once said gun deaths are 'worth it' to save Second Amendment

Charlie Kirk, shot dead in Utah, once said gun deaths are 'worth it' to save Second Amendment

From governance to tourism, how Gen-Z protests have damaged Nepal

From governance to tourism, how Gen-Z protests have damaged Nepal

Did Russia deliberately send drones into Poland’s airspace?

Did Russia deliberately send drones into Poland’s airspace?

Netanyahu ‘killed any hope’ for Israeli hostages: Qatar PM after Doha strike

Netanyahu ‘killed any hope’ for Israeli hostages: Qatar PM after Doha strike

Charlie Kirk, shot dead in Utah, once said gun deaths are 'worth it' to save Second Amendment

Charlie Kirk, shot dead in Utah, once said gun deaths are 'worth it' to save Second Amendment

From governance to tourism, how Gen-Z protests have damaged Nepal

From governance to tourism, how Gen-Z protests have damaged Nepal

Did Russia deliberately send drones into Poland’s airspace?

Did Russia deliberately send drones into Poland’s airspace?

Netanyahu ‘killed any hope’ for Israeli hostages: Qatar PM after Doha strike

Netanyahu ‘killed any hope’ for Israeli hostages: Qatar PM after Doha strike

Top Shows

Vantage Firstpost America Firstpost Africa First Sports

QUICK LINKS

  • Trump-Zelenskyy meeting
Latest News About Firstpost
Most Searched Categories
  • Web Stories
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Tech/Auto
  • Entertainment
  • IPL 2025
NETWORK18 SITES
  • News18
  • Money Control
  • CNBC TV18
  • Forbes India
  • Advertise with us
  • Sitemap
Firstpost Logo

is on YouTube

Subscribe Now

Copyright @ 2024. Firstpost - All Rights Reserved

About Us Contact Us Privacy Policy Cookie Policy Terms Of Use
Home Video Shorts Live TV