British Government Ministers Risk Being Hacked

WhatsApp users have been hit by an urgent warning from technology experts after a potential hacking hazard was identified by a secretive Israeli surveillance firm Paragon Solutions. Paragon have reportedly discovered a method to break into a host of encrypted smartphone apps.

As a consequence, the UK Government Security Group has issued guidance to government ministers following questions being raised about ministers using their personal phones WhatsApp and private email. to conduct official business. 

Prime Minister Boris Johnson’s has also been accused of poor cyber security, after it was revealed last year that he was still using his personal mobile number that was widely available. 

It is understood the guidance was issued in May after high-profile stories about hackers exploiting WhatsApp. “The National Cyber Security Centre (NCSC) and the Government Security Group in the Cabinet Office may also issue guidance in response to specific threats... For example, the Government Security Group recently provided advice on how to secure devices using two-factor authentication in response to hackers using fake messages to access WhatsApp.” UK Cabinet Secretary Simon Case said.

Hackers are known to have targeted Heads of State and other government officials around the world through WhatsApp, with Ministers in Australia, the Netherlands and South Africa having suffered successful attacks on their digital devices 

Police forces in the UK have issued warnings about a widespread fraud  targeting WhatsApp users in which fraudsters control a WhatsApp user’s account and messages one of their contacts under that guise. This is sent at around the same time a text or email is received by that same contact from WhatsApp, which contains a verification code that the hacker has requested by pretending to be them.The scammer explains that they accidentally requested the code to be sent to the contact’s number and ask that they send it over to them.

Apple iPhones can also be compromised and their sensitive data stolen through hacking software that doesn’t require the target to click on a link, according to a report by Amnesty International, who say their researchers have discovered iPhones belonging to journalists and human rights lawyers had been infected with NSO Group’s Pegasus malware that can provide the attacker access to messages, emails and the phone’s microphone and camera.

GuardianDaily Record:     Hitechglitz:    Bollyinside:    Infosecurity Magazine:    Wales Online:   

Businesss Telegraph:    Birmingham Mail:     Image: Unsplash

You Might Also Read: 

WhatsApp Updates Its 'Privacy' Rules:

 

« New Ransomware Variant Discovered
The Taliban's Mastery Of Information Warfare »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Secunet Security Networks

Secunet Security Networks

Secunet is a leading cyber security company offering a combination of consultancy and products, delivering the highest level of security for data, applications and digital identities.

Perspective Risk

Perspective Risk

Perspective Risk provides penetration testing, security assessments, risk management & compliance solutions, InfoSec training and consultancy services.

Allure Security Technology

Allure Security Technology

Allure provide Behavioral Analytics software that combines machine learning and decoy technology to protect enterprise devices from data loss and intrusion both inside and outside the enterprise.

Netpay International

Netpay International

Netpay's innovative technology ensures your business can provide secure, innovative payments solutions to all your e-commerce transactions.

Sponge

Sponge

Cybersecurity Sorted by Sponge is a seriously engaging training game to make your staff the first line of defence against cyber threats.

Scout Ventures

Scout Ventures

Scout Ventures is an early stage venture capital firm that is making the world a better, safer place by cultivating standout frontier technologies.

Qohash

Qohash

With a focus on data security, Qohash supports security, compliance and optimization use cases enhancing your risk management process.

NewAE Technology

NewAE Technology

NewAE Technology is revolutionizing the hardware security market by making every engineer and designer aware of side-channel power analysis and glitching as important attack vectors.