British Government Ministers Risk Being Hacked

WhatsApp users have been hit by an urgent warning from technology experts after a potential hacking hazard was identified by a secretive Israeli surveillance firm Paragon Solutions. Paragon have reportedly discovered a method to break into a host of encrypted smartphone apps.

As a consequence, the UK Government Security Group has issued guidance to government ministers following questions being raised about ministers using their personal phones WhatsApp and private email. to conduct official business. 

Prime Minister Boris Johnson’s has also been accused of poor cyber security, after it was revealed last year that he was still using his personal mobile number that was widely available. 

It is understood the guidance was issued in May after high-profile stories about hackers exploiting WhatsApp. “The National Cyber Security Centre (NCSC) and the Government Security Group in the Cabinet Office may also issue guidance in response to specific threats... For example, the Government Security Group recently provided advice on how to secure devices using two-factor authentication in response to hackers using fake messages to access WhatsApp.” UK Cabinet Secretary Simon Case said.

Hackers are known to have targeted Heads of State and other government officials around the world through WhatsApp, with Ministers in Australia, the Netherlands and South Africa having suffered successful attacks on their digital devices 

Police forces in the UK have issued warnings about a widespread fraud  targeting WhatsApp users in which fraudsters control a WhatsApp user’s account and messages one of their contacts under that guise. This is sent at around the same time a text or email is received by that same contact from WhatsApp, which contains a verification code that the hacker has requested by pretending to be them.The scammer explains that they accidentally requested the code to be sent to the contact’s number and ask that they send it over to them.

Apple iPhones can also be compromised and their sensitive data stolen through hacking software that doesn’t require the target to click on a link, according to a report by Amnesty International, who say their researchers have discovered iPhones belonging to journalists and human rights lawyers had been infected with NSO Group’s Pegasus malware that can provide the attacker access to messages, emails and the phone’s microphone and camera.

GuardianDaily Record:     Hitechglitz:    Bollyinside:    Infosecurity Magazine:    Wales Online:   

Businesss Telegraph:    Birmingham Mail:     Image: Unsplash

You Might Also Read: 

WhatsApp Updates Its 'Privacy' Rules:

 

« New Ransomware Variant Discovered
The Taliban's Mastery Of Information Warfare »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

SafeCharge

SafeCharge

SafeCharge is a global provider of technology-based multi-channel payments services and risk management solutions for demanding businesses.

Auxilium Cyber Security

Auxilium Cyber Security

Auxilium Cyber Security is independent information security consultancy company.

ThreatSpike Labs

ThreatSpike Labs

ThreatSpike Labs provides the first end-to-end fully managed security service for companies of all sizes.

ReconaSense

ReconaSense

ReconaSense helps protect people, assets, buildings and cities with its next-gen access control and converged physical security intelligence platform.

aDolus

aDolus

aDolus delivers a robust solution for safeguarding against counterfeit or malicious software and firmware in mission-critical systems.

Institute of Informatics and Telematics (IIT)

Institute of Informatics and Telematics (IIT)

IIT carries out activities of research, assessment, technology transfer and training in the field of Information and Communication Technologies and of Computational Sciences.

Hut Six Security

Hut Six Security

Train, test and track your Information Security culture through information security awareness training and customised phishing simulation campaigns.

Lantaca

Lantaca

Lantaca specialize in cloud-based security solutions for modern networks.