British Government Ministers Risk Being Hacked

WhatsApp users have been hit by an urgent warning from technology experts after a potential hacking hazard was identified by a secretive Israeli surveillance firm Paragon Solutions. Paragon have reportedly discovered a method to break into a host of encrypted smartphone apps.

As a consequence, the UK Government Security Group has issued guidance to government ministers following questions being raised about ministers using their personal phones WhatsApp and private email. to conduct official business. 

Prime Minister Boris Johnson’s has also been accused of poor cyber security, after it was revealed last year that he was still using his personal mobile number that was widely available. 

It is understood the guidance was issued in May after high-profile stories about hackers exploiting WhatsApp. “The National Cyber Security Centre (NCSC) and the Government Security Group in the Cabinet Office may also issue guidance in response to specific threats... For example, the Government Security Group recently provided advice on how to secure devices using two-factor authentication in response to hackers using fake messages to access WhatsApp.” UK Cabinet Secretary Simon Case said.

Hackers are known to have targeted Heads of State and other government officials around the world through WhatsApp, with Ministers in Australia, the Netherlands and South Africa having suffered successful attacks on their digital devices 

Police forces in the UK have issued warnings about a widespread fraud  targeting WhatsApp users in which fraudsters control a WhatsApp user’s account and messages one of their contacts under that guise. This is sent at around the same time a text or email is received by that same contact from WhatsApp, which contains a verification code that the hacker has requested by pretending to be them.The scammer explains that they accidentally requested the code to be sent to the contact’s number and ask that they send it over to them.

Apple iPhones can also be compromised and their sensitive data stolen through hacking software that doesn’t require the target to click on a link, according to a report by Amnesty International, who say their researchers have discovered iPhones belonging to journalists and human rights lawyers had been infected with NSO Group’s Pegasus malware that can provide the attacker access to messages, emails and the phone’s microphone and camera.

GuardianDaily Record:     Hitechglitz:    Bollyinside:    Infosecurity Magazine:    Wales Online:   

Businesss Telegraph:    Birmingham Mail:     Image: Unsplash

You Might Also Read: 

WhatsApp Updates Its 'Privacy' Rules:

 

« New Ransomware Variant Discovered
The Taliban's Mastery Of Information Warfare »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Renaissance

Renaissance

Renaissance is Ireland's premier value added distributor of IT security solutions and a leading independent provider of business continuity consultancy.

Black Hat Briefings

Black Hat Briefings

The Black Hat Briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world.

Nutanix

Nutanix

The Nutanix enterprise cloud platform provides performance, robust security, and seamless application mobility for a broad range of enterprise applications.

SiteGuarding

SiteGuarding

SiteGuarding provide website security tools and services to protect your website against malware and hacker exploits.

Lutech

Lutech

Lutech is an Italian ICT engineering and services company. Business solution areas include cyber security.

Dubai Electronic Security Center (DESC)

Dubai Electronic Security Center (DESC)

Dubai Electronic Security Center (DESC) was founded to develop and implement information security practices in Dubai.

Dual Layer IT Solutions

Dual Layer IT Solutions

Dual Layer offer a full range of IT Services and Solutions for businesses from IT infrastructure design to cloud/hosted solutions, cybersecurity, disaster recovery and IT training.

Barbara IoT

Barbara IoT

Barbara is an industrial device platform specifically designed for IoT deployments.

Cynamics

Cynamics

Cynamics is the only network monitoring solution built specifically for Smart City, Public Safety and Critical Infrastructure networks.

Arctic Wolf Networks

Arctic Wolf Networks

Arctic Wolf Networks delivers the industry-leading security operations center (SOC)-as-a-service that redefines the economics of cybersecurity.

National Cybersecurity Competence Centre (NC3)

National Cybersecurity Competence Centre (NC3)

NC3 has been established in response to growing demands for practically applicable products and solutions for ensuring cybersecurity of critical and non-critical information infrastructures.

British Security Industry Association - CySPAG

British Security Industry Association - CySPAG

CySPAG is a special interest group within the British Security Industry Association (BSIA) focused on reducing the risk of product related cybercrime.

Cymptom

Cymptom

At Cymptom our purpose is to enable security managers to see at a glance all urgently risky gaps  in their organizations’ security posture at any given moment.

Coralogix

Coralogix

Coralogix are rebuilding the path to observability using a real-time streaming analytics pipeline that provides monitoring, visualization, and alerting capabilities without the burden of indexing.

Strivacity

Strivacity

Strivacity lets brands quickly add secure login and identity management capabilities to their customer-facing applications without tying up an army of developers or consultants to do it.

CaseMatrix

CaseMatrix

Discover a new era of legal intelligence with CaseMatrix. We identify potential class action cases arising from cyber incidents and data breaches.