Arabic Arabic Chinese (Simplified) Chinese (Simplified) Dutch Dutch English English French French German German Italian Italian Portuguese Portuguese Russian Russian Spanish Spanish
| (844) 627-8267

Spoofing vs hacking: What’s the difference? | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker


SIOUX FALLS, S.D. (KELO) — On January 23, 2023, South Dakota Gov. Kristi Noem announced via news release that her personal cell phone had been “hacked.” The release in question states: “Governor Noem’s personal cell phone number has been hacked and used to make hoax calls.”

It is unclear from the release whether Noem’s personal device itself has been compromised, which would constitute a “hack”, or whether someone has simply posed as Noem using her number, which would not.

A request for clarification on the nature of the “hack” described in the release was not answered by the Governor’s Office. Regardless of this specific situation, what is the main difference between hacking into a device and simply using someone else’s phone number, an act known as ‘spoofing’?

To find out, we spoke with Arica Kulm, Director of Digital Forensic Services at Dakota State University.

“It’s kind of two different things,” said Kulm. “Your identity can be compromised — we put our information out there on social media; we put our information out there online in a lot of different forms — it’s really hard to protect all of your information.”

Kulm says that data breaches can reveal your birth date, phone number, social security number or other identifying info, all of which can be packaged and sold online.

“The other side of that is your phone can be compromised,” Kulm continued. She says this can be the result of downloading an app, clicking on a link or using unsecured internet connections.

The key difference between spoofing and hacking comes down to this: “If your device is compromised, that would be considered your device has been hacked — if it’s your identity that has been compromised, you’ve been spoofed or impersonated,” said Kulm. “If I make a phone call and use your phone number, I haven’t compromised your phone — I’m spoofing your phone number.”

Spoofing, it turns out, isn’t difficult. “There’s online services you can use to do that,” Kulm said. “There’s ways to make prank phone calls doing that — businesses use that to mask their phone number so that people will actually pick up the phone.”

Hacking is more complicated. As mentioned, a hacker can gain access to your device if you download an app with malware, click on link or use unsecured internet. More often than not, a hacker is relying on you to make the mistake of leaving them an opening.

Spoofing is much more difficult to prevent. If someone can find your phone number, they can likely spoof it, and unless you hear of someone using it, there is no way to tell if you’ve been spoofed.

This is because the person using your number is simply displaying it as their own. They are not actually receiving calls and texts sent to your number.

Kulm says there is an easy way to tell if you’re receiving a message from a spoofed number. “If it comes through as a text message, just pick up the phone and call that person,” she said.

If you have been spoofed, there is likely little you can do beyond letting people know that if they receive an odd message, it isn’t from you. If you’ve been hacked, there is a bit more you can do.

“You can factory reset your phone,” Kulm said, but also noted that if you redownload an app with malware, you’ll be right back where you started. “I would definitely check your online accounts — even consult professional services — it would be best to let a professional figure out where it came from.”

——————————————————–


Click Here For The Original Story From This Source.

National Cyber Security

FREE
VIEW