13+ years of experience in the Information Technology and Communication industry | Founder of Secure Triad
Smartphones are an inseparable part of our lives. If our phone is taken away from us for even a day, it feels like being deprived of a basic need.
We store all kinds of data in our phones – contacts, photos, videos, personal data, documents. We use numerous apps for making our lives easy – banking, insurance, online shopping, stocks, real estate. We rely on our phones for communication and socializing – chatting, video calling, social media, emails, professional groups... the list of uses is endless.
If your phone is lost or stolen, your data, information, and identity are at risk!
For instance, attackers can:
Hackers, cyberpunks, and cyber terrorists commit criminal acts for extorting money, controlling lives, or damaging a person’s reputation. They can do this if they are able to hack into our phones, and they are constantly on the hunt for searching and exploiting vulnerable phones.
Mobile data, WiFi, websites, and mobile apps – stuff that we absolutely need – have made it possible and easier for hackers to try and get access to our phones.
Below are some of the methods hackers use to gain access to phones:
Hackers send email or text messages containing a link or image asking that you click on it to get something or do an action.
They impersonate a company, usually one that a person may have a professional relationship with. The email or text message bears a likeness to any email or message sent genuinely by the company.
However, the content they send has a virus or malware that, if clicked on, will get access to all information on your phone or remotely control your phone.
This attack is similar to phishing. However, with spamming, you are likely to receive multiple emails or messages in a short duration of time.
The sender is not a physical person but from software or “bot” used for the sole purpose of generating thousands of messages at a time and targeting multiple phone numbers.
In spam attacks, a hacker hopes that a person may mistakenly click open an email or message and the content within, downloading the virus or hacking software to the phone.
Hackers use alluring messages like you have won a ton of money, or a freebie, or been shortlisted for vacation, etc., to make it attractive for their targets to act on such emails and messages.
A hacker calls up your network provider, pretends to be you, spins a story like a phone is lost, and asks for a replacement SIM.
If they successfully convince the provider they are you, they get the replacement SIM card, and your original SIM gets deactivated.
So now, effectively, the hacker gets access to your emails, contacts, messages, content on drives, etc.
If a hacker is within range of your phone and the Bluetooth on your phone is activated, the hacker can then connect to your phone and access all data within. Hackers usually try this attack in crowded areas.
A similar goes for hacking attempts on phones connected to free public WiFi.
So, what should each person do to help keep their smartphone or other mobile devices secure?
What are some of the common and effective precautions that mobile phone users should adopt that can go a long way in keeping their phones, and consequently themselves, safe?
Here are the precautionary measures we should follow:
To quote from a personal experience…Not long ago I lost my bank debit/ATM card. I immediately blocked it once I found out. Later that day I received a call from an unknown landline number, and the person calling said they were from my bank and wanted to verify my details – date of birth and address.
Before revealing anything, I asked them why they need this data, and they said it was about a bank card reported to the local police station as lost that morning.
With a little more back and forth questions, I finally accepted the caller was authentic and only then proceeded to give my details. [I was really lucky to get my card back!]
We should also consider some other safeguarding measures that are quite important, but we do not really know about them or do not adopt them.
Install the updates released by your smartphone company and/or operating system provider. They often contain the latest security patches released to protect against new threats. Do not keep postponing the updates only because they take up memory and need time to install.
We all download countless apps for personal/professional needs and entertainment, but how many of us consciously install anti-virus?
Your phone deserves similar protection as your laptop or computer. Several good and reliable anti-virus apps for smartphones are available.
Trying to bypass your phone’s standard configuration results in the loss of most security settings built into the phone.
These activities place your phone at undue risk, especially from certain malware that specifically tries to get root access. Jailbreaking/rooting also further prevents your phone from getting the regular OS updates rolled out by the providers.
This feature allows you to wipe all data from your phone remotely if it gets stolen or lost.
Let your network provider know so they can block your phone and stop anyone else from using it. Then, retrieve your phone’s IMEI number and file a report with the local police station.
These couple of steps are extremely important to safeguard yourself as, firstly, you do not continue paying for services (calls, messages, etc.) that you are not using; and secondly, you are not responsible in case your phone has been used for harmful and malicious activities after it was stolen.
A smartphone contains a wealth of data and information. If it falls into the wrong hands, there is no limit to the damage it can cause.
Previously published on https://securetriad.io/how-to-keep-mobile-phones-secure/.
Create your free account to unlock your custom reading experience.