How was Jeff Bezos’ phone hacked?

By this time, we competence have listened of a news that Amazon owner Jeff Bezos and his wife, MacKenzie, are removing a divorce after 25 years of marriage. MacKenzie reportedly will customarily get a entertain of Jeff’s $137 billion net value nonetheless still, $36 billion still creates it a many costly divorce in history.

Bonus podcast: How many income are we talking? In this partial of Consumer Tech Update, Kim talks about Jeff Bezos imminent divorce.


The resources heading to a divorce competence have some-more than meets a eye, though. No, we’re not here to assume about a couple’s personal lives, that’s their possess business. However, new sum are rising that competence impact we some-more than we think.

Read on and see what these new reports competence meant for a inhabitant cybersecurity.

Was Jeff Bezos’ phone hacked by Saudi Arabia?

Amazon CEO Jeff Bezos’ smartphone was hacked by a Saudi Arabian government, pronounced his certainty conduct honcho Gavin de Becker.

In a extensive Daily Beast article, de Becker suggested an purported Saudi Arabian tract to concede Bezos’ smartphone.

He also wrote that a penetrate has links to American Media Inc (AMI), a publisher of National Enquirer, a publication that unprotected a sum of a Amazon CEO’s event with Lauren Sanchez and threatened to exhibit a pair’s private content messages.

Although he didn’t offer any petrify proof, relying usually on inconclusive evidence, de Becker wrote that his “investigators and several experts resolved with high certainty that a Saudis had entrance to Bezos’ phone and gained private information.”

“As of today, it is misleading to what degree, if any, AMI was wakeful of a details,” he continued.

For a part, AMI discharged a purported connectors with a Saudis and confirmed that a information about a event indeed came from Sanchez’s possess brother, Michael.

hot pocket

Bezos penetrate has frightful implications for cybersecurity

I don’t know about you, nonetheless appropriation Bezos’ private information around a informer instead of a smartphone penetrate is some-more calming to a public, don’t we think?

If a high-profile particular like a tech noble Bezos, whose smartphone is ostensible to be as inflexible as a chief bunker, can be compromised, what does that meant for a rest of us small mortals?

Well, we’re not accurately Jeff Bezos, nonetheless this means that anyone who is determined adequate and is in possession of a right collection can concede any phone or gadget. If someone wants to penetrate your phone, with adequate calm and bend grease, they certain can.

But how? There are a accumulation of ways. For instance, Bezos’ competence have clicked a boobytrapped couple sent to him around email. The tainted webpage, in turn, could have commissioned a required malware to concede his phone.

Could it be a antagonistic app that was downloaded and commissioned on a billionaire’s phone? How about a supply sequence conflict identical to Asus refurbish malware hijacking that happened recently?

Or worse yet, maybe there’s a still different zero-day feat that authorised a hackers to remotely view on Bezos’ phone though detection.

Now, that’s a frightful thought! Remember, a Saudis were also indicted of conducting impassioned notice on murdered publisher Jamal Khashoggi’s electronic inclination though his knowledge.

Until serve sum are suggested about this purported penetrate (which we doubt will ever come to light), we’ll never know for sure. However, what we can be certain about are a stairs we can do to strengthen yourself from identical attacks.

Bonus podcast: No one is defence to hacking. You competence not be a billionaire like Bezos, nonetheless we can take stairs to make your phone hack-proof. Listen to this giveaway Consumer Tech Update for some-more tips on how to close down your phone.

How to strengthen your smartphone from hacks

Avoid third-party app stores 

If we are going to download apps, get them from central app stores like Google Play and a Apple App Store. These central app stores have certainty measures in place that stop antagonistic apps from being available.

With a few exceptions, in roughly each case, a antagonistic app will come from a third-party source. If you’re an iPhone user, don’t jailbreak your tool and equivocate installing jailbroken apps

Install certainty software

Make certain we have clever certainty module on your gadget, If you’re an Android user, make sure, we capacitate Android’s real-time certainty program, Google Play Protect. It positively will be a outrageous assistance in containing antagonistic apps before they can means damage.

Never open unsure attachments in emails

Don’t open attachments from unsolicited emails. These attachments from feign emails are typically vectors for infections.

Be discreet with links

If we get an email or presentation from a site that we find suspicious, don’t click on a links. It’s improved to form a website’s residence directly into a browser than clicking on a link. Always double check a URL of sites we revisit too and demeanour out for typos.

Update your gadget

Make certain that we have downloaded a latest certainty and handling complement updates. These updates customarily embody rags to assistance strengthen your device from a many new threats.

Enable your phone’s close screen

Here’s a elementary approach to forestall snoops and hackers from physically installing malware on your phone – close your phone!

You competence select to use a passcode, a fingerprint, a pattern, or facial approval nonetheless make certain we have this simple certainty environment capacitate all a time.

Oh, and if we use a passcode, be certain it’s something that won’t be simply guessed. Don’t use your birthday or home address. Even better, use a longer fibre of numbers or characters.




In other news, Facebook is still a renouned place for cybercriminal groups to tract attacks

Facebook has always been a hotbed for feign news, misinformation, swindling theories, fraud advertisements and hatred groups. Apparently, it also has a cybercriminal problem. As it turns out, bootleg cybercrime services are not customarily accessible within a untrustworthy underbelly of a dim web — they are also advertised plainly and utterly brazenly within Facebook groups and pages! What is Facebook doing to quarrel these dangers?

Tap or click to learn some-more about a threats we face on Facebook.

Please share this information with everyone. Just click on any of a amicable media buttons on a side.

More tabs ...

Posted in
Tagged . Bookmark the permalink.
short link