Skip to: Content
Skip to: Site Navigation
Skip to: Search

Scarlett Johansson cellphone pictures aren't all that smart phone hackers are after

As more and more corporate and personal business is done via mobile devices and social media, it is more than Scarlett Johansson cell phone pictures that are being hacked.

By Staff writer / September 30, 2011

Actress Scarlett Johansson poses for photographers on the catwalk before the Dolce & Gabbana Spring/Summer 2012 women's collection during Milan Fashion Week September, 2011. Ms. Johansson's mobile phone was hacked in September.

Alessandro Garofalo/ REUTERS


Los Angeles

Cellphone hacking has had more than its 15 minutes of fame recently, from the London reporting scandal that shook Rupert Murdoch's media empire to the recent complaints from Hollywood celebrities Scarlett Johansson and Mila Kunis that private photos were stolen from their mobile hand-helds.

Skip to next paragraph

But these are not just isolated headlines, says former hacker Kevin Mahaffey, now chief technology officer for Lookout Mobile Security. The trend is accelerating quickly, he says.

"Just from January to June, the likelihood of a mobile malware attack has gone up 2-1/2 times," he says, citing a recently released study by his firm. Computing is moving from desktops to mobile devices, he says, and as it does, so will serious hacking activity.

Hacker Kevin Mitnick is eager to show how easily anyone can be hit.

"Give me your cellphone number," he says in an interview. Within seconds he has sent a spoof text message to my co-worker's cellphone, as if it were coming from my number.

It appears I am telling her, "Please go to this site, ASAP –"

This is a classic ruse, Mr. Mitnick says, pointing out that a malicious hacker would have inserted a booby-trapped website that could then mine passwords and other personal information from my friend.

"Because she trusts you, she probably would click on the link without worrying that it might be fake," says Mitnick, a once-notorious hacker who spent five years in federal prison for his crimes. He now travels the globe teaching Fortune 500 companies how to keep their information safe.

This illustration underlines a sobering reality in an increasingly mobile, social media-driven daily life, say Mitnick and fellow security and technology experts: As more and more corporate and personal business is done via mobile devices and social media, consciousness about security in the new environment is not keeping pace.

Technology moves faster than we do, says Harry Sverdlove, chief technology officer for Bit9, an Internet security firm based in Waltham, Mass. "Technology itself progresses at the speed of electronics," but the way society uses new tools and understands the pitfalls of them tends to progress at a much more human pace, he adds.

In the rush to embrace new technologies, "we shed precautions learned with previous technology like so many old clothes," he says. A survey earlier this year by Trusteer, a financial services security firm, revealed that people were three times more likely to click on an unfamiliar link sent to their cellphone than one received on their desktop computer.

"People have very different attitudes about their cellphones than they do about their computers," says Ben Knieff, director of fraud management technology at NICE Actimize, which specializes in security services. Mobile phones have a very personal, private feel to them, he adds.


Read Comments

View reader comments | Comment on this story