British Government Ministers Risk Being Hacked

WhatsApp users have been hit by an urgent warning from technology experts after a potential hacking hazard was identified by a secretive Israeli surveillance firm Paragon Solutions. Paragon have reportedly discovered a method to break into a host of encrypted smartphone apps.

As a consequence, the UK Government Security Group has issued guidance to government ministers following questions being raised about ministers using their personal phones WhatsApp and private email. to conduct official business. 

Prime Minister Boris Johnson’s has also been accused of poor cyber security, after it was revealed last year that he was still using his personal mobile number that was widely available. 

It is understood the guidance was issued in May after high-profile stories about hackers exploiting WhatsApp. “The National Cyber Security Centre (NCSC) and the Government Security Group in the Cabinet Office may also issue guidance in response to specific threats... For example, the Government Security Group recently provided advice on how to secure devices using two-factor authentication in response to hackers using fake messages to access WhatsApp.” UK Cabinet Secretary Simon Case said.

Hackers are known to have targeted Heads of State and other government officials around the world through WhatsApp, with Ministers in Australia, the Netherlands and South Africa having suffered successful attacks on their digital devices 

Police forces in the UK have issued warnings about a widespread fraud  targeting WhatsApp users in which fraudsters control a WhatsApp user’s account and messages one of their contacts under that guise. This is sent at around the same time a text or email is received by that same contact from WhatsApp, which contains a verification code that the hacker has requested by pretending to be them.The scammer explains that they accidentally requested the code to be sent to the contact’s number and ask that they send it over to them.

Apple iPhones can also be compromised and their sensitive data stolen through hacking software that doesn’t require the target to click on a link, according to a report by Amnesty International, who say their researchers have discovered iPhones belonging to journalists and human rights lawyers had been infected with NSO Group’s Pegasus malware that can provide the attacker access to messages, emails and the phone’s microphone and camera.

GuardianDaily Record:     Hitechglitz:    Bollyinside:    Infosecurity Magazine:    Wales Online:   

Businesss Telegraph:    Birmingham Mail:     Image: Unsplash

You Might Also Read: 

WhatsApp Updates Its 'Privacy' Rules:

 

« New Ransomware Variant Discovered
The Taliban's Mastery Of Information Warfare »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Fieldfisher

Fieldfisher

Fieldfisher's Technology, Outsourcing & Privacy Group has class-leading expertise in privacy, data & cybersecurity, digital media, big data, the cloud, mobile payments and mobile apps.

CCL Solutions Group

CCL Solutions Group

CCL is one of Europe’s leading digital investigation specialists, supporting law enforcement, government and organisations across both public and private sectors.

Apicrypt

Apicrypt

Apicrypt enables secure communications between health professionals by using strong encryption technologies.

Sepior

Sepior

Our vision is to make Sepior the leading provider of cloud-encryption software in the world.

Telspace Africa

Telspace Africa

Telspace Africa provide the highest level of IT security solutions including advisory, penetration testing, vulnerability assessments, red teaming, social engineering and training.

VADO Security Technologies

VADO Security Technologies

VADO Security enables the safe transfer of data between low & high security networks.

Intelligent Waves

Intelligent Waves

Intelligent Waves holds and manages contracts to provide an array of intelligence, operational, communications and IT support to the USG in austere, forward-deployed, hazardous duty environments.

Exatel

Exatel

Exatel is Poland’s leading provider of ICT security services.

Outsource UK

Outsource UK

Outsource UK is an independent recruitment company supplying highly-skilled technology, change and engineering talent to clients within a range of specialist sectors including Cyber Security.

Forum of Incident Response & Security Teams (FIRST)

Forum of Incident Response & Security Teams (FIRST)

FIRST is the global Forum of Incident Response and Security Teams.

UMBRA

UMBRA

UMBRA is solely concerned with protecting governments against Nation State attacks. We are not a consumer or enterprise company.

Grindstone Ventures

Grindstone Ventures

Grindstone Ventures is a post-seed fund that supports post-seed equity and quasi-equity investments in early-stage innovation-driven and/or technology companies.

Mobilicom

Mobilicom

Mobilicom is an end-to-end provider of cybersecurity and smart solutions for drones, robotics & autonomous platforms.

SoftForum

SoftForum

SoftForum is a company specializing in next-generation information security solutions in the Quantum-Resistant-Cryptography (PQC) field.

Vertek

Vertek

Vertek is a leading provider of operations consulting, end-to-end business process outsourcing, business intelligence, software applications and managed cybersecurity solutions.

Pillar Security

Pillar Security

Pillar Security are building the unified AI security platform to identify, assess, and mitigate security risks across your entire AI lifecycle.