Search in HRJ Tricks

Related Posts Plugin for WordPress, Blogger...

Monday, August 6, 2012

Android Hackers will demonstrate Fully loaded Spying Applications & Mobile Botnet

This Sunday, The Capital , New Delhi plays host to an International The Hackers Conference where blackhat hackers will discuss the challenges of cyber safety with security agencies.

Your smartphone is an always-on and always-connected digital extension of your life which will be used by attackers to covertly steal your sensitive data and spy on you. Mahesh Rakheja , An Independent Security Researchers and Android Developer/Hacker will demonstrate "Android Spy Agent".

This application allows us to remotely access the entire victim’s personal information and even though the confidential data available in the android cell phone. The type of personal information include the victim’s contacts, call logs, messages, browser’s history, GPS location and many more information directly available on the victim’s cell phone. 

Many-a-times we think that is there any way by which we can read the private sms of anyone. So here is the solution Mr. Mahesh will present in The Hackers Conference 2012 platform with Hundreds of advance features.

This application can also allows the attacker to remotely delete the data available on the victim’s phone. In order to perfectly work this application you have to gain access to the victim’s android cell phone for at least 20 seconds. You have to install the application and then restart the cell phone. After restart your application get automatically starts on the victim’s cell phone. Now you can access the victim’s cells information for any normal cell phone and get the response on it. The android spy agent will be hidden in the victim’s cell phone and not allows the victim to easily uninstall or delete it from the cell.

In Another Talk Android Hacker Aditya Gupta and Subho Halder will talk about "All your Droids belong to me : A look into Mobile Security in 2012". Researchers have developed and will Demonstrate  malware for Android phones that can be used as a spam botnet.

"The talk is about Android Malwares, Botnets and all the crazy stuff you have been hearing in the past. We will give an inside view on how the black hat underground uses this, to earn 5-6 digit income per month . For this, We will start off with creating an Android Malware, and then will gradually move on to the Botnet Part.", Aditya Gupta said.

Maintaining that a wide variety of services is being offered on the mobile platforms without proper security implementation, Anurag Kumar Jain and Devendra Shanbhag from Tata Consultancy Services will deliberate on the topic, "Mobile Application Security Risk and Remediation". They will highlight the need for application security in mobile applications, the threats in a mobile environment, key security issues that can creep in mobile applications, and suggests a secure development approach which can possibly safeguard mobile applications from becoming “sitting ducks” for attackers and mobile malware.

Experts from countries like Iran and Argentina will share space with Indian speakers in the day-long discussion at the India Habitat Centre. Yet another important issue The Hackers Conference 2012 will deliberate on is the Internet censorship in India.


  1. Here the words like "Spying" and "hacking" combines together and giving a scary sense. lol
    Anyways we are just waiting for their demonstration and hope that they will come up with better plans.

  2. I all the time used to study paragraph in news papers but now as I
    am a user of internet therefore from now I am using net for articles or
    reviews, thanks to web.

    Feel free to visit my blog post; psychic reading
    my page > love psychic

  3. It's great that you are getting thoughts from this article as well as from our argument made at this place.

    Feel free to surf to my blog post :: savings account payday loans

  4. Do you have a spam problem on this site; I also
    am a blogger, and I was curious about your situation; we have created some nice methods and
    we are looking to swap techniques with others, why not shoot me
    an email if interested. zetaclear buy zetaclear

    Have a look at my web-site

  5. I really like the picture in which "android" is eating "apple" but the fact is iphone is way more popular than android