Protect Your Smartphone From Hackers
Posted: 11 Jan 2012, 07:10
What is a smartphone? Its that little portable computer that most of us carry around our pocket (or handbag) that amongst other things is occasionally used to make phone calls
The Opportunity for Hackers
Smartphones are big business. The Wall Street Journal estimates that almost 240 million smartphones were sold last year, far surpassing the number of laptop PCs sold in the same period. That’s a huge opportunity for those who make smartphones or sell services. And it’s a huge target for those who would like to hack your smartphone.
Hackers at Work
Essentially, as a smartphone is effectively a connected PC that fits in your pocket (or handbag), it’s not surprising that smartphone hackers use the same basic tactics that they use to extract information from PCs.
Snoopware.
Originally marketed as a way for parents to monitor their kids’ mobile phone usage, snoopware can be used to eavesdrop on your conversations, emails, text messages contact lists, and passwords. If you use a smartphone to make financial transactions, snoopware can be programmed to eavesdrop on those too.
Smiphishing.
This is like email phishing on a PC, except that it sends phishing messages via your Short Message Service (SMS) text service. Typically, you’ll receive a text message from a hacker posing as a business with whom you do business. The message may ask you to update a password, re-enter your credit card or provide sensitive information which can be used to defraud you. Or to commandeer your phone to launch bot attacks or damage your files.
Spam.
Plain old spam, an oldie but a goodie, just like the kind that attacks your PC email, will also turn up in your smartphone email or even in text messages. A lot of it is just annoying, but some of it will be unsolicited offers or smiphishing, both are designed to get your personal information for financial gain or to destroy your files.
Bluetooth.
Your Bluetooth connection can be hacked to provide access to your phone any time it’s turned on, even when it’s turned on but not in use.
What You Can Do:
In a word, beware. Be as careful in how you use your smartphone as you are when you use your PC.
- Don’t open email if you don’t know the sender. If any sender asks you to provide sensitive information, don’t. If such a request seems to be from a business you know, use your browser to go to their website or a phone to call the business directly to verify the request.
- Don’t answer text messages that ask for personal information. Again, if you think it might be legitimate, contact the purported sender by other means.
- Delete spam. Don’t answer it, ever.
- Turn off Bluetooth when you’re not using it. Also, turn it off when you are speaking or entering sensitive information into your smartphone.
- Buy protection. Just as you should always secure your PC with up-to-date Internet security software, you should protect your smartphone with smartphone security software to protect your smartphone against the latest security threats. Remember you are carrying a computer in your pocket (or purse)!
Be Smart, Beware
Beware, be careful, install security software and keep it up to date. Then you can talk, text, browse, and transact fearlessly. And live your mobile life to its fullest.
The Opportunity for Hackers
Smartphones are big business. The Wall Street Journal estimates that almost 240 million smartphones were sold last year, far surpassing the number of laptop PCs sold in the same period. That’s a huge opportunity for those who make smartphones or sell services. And it’s a huge target for those who would like to hack your smartphone.
Hackers at Work
Essentially, as a smartphone is effectively a connected PC that fits in your pocket (or handbag), it’s not surprising that smartphone hackers use the same basic tactics that they use to extract information from PCs.
Snoopware.
Originally marketed as a way for parents to monitor their kids’ mobile phone usage, snoopware can be used to eavesdrop on your conversations, emails, text messages contact lists, and passwords. If you use a smartphone to make financial transactions, snoopware can be programmed to eavesdrop on those too.
Smiphishing.
This is like email phishing on a PC, except that it sends phishing messages via your Short Message Service (SMS) text service. Typically, you’ll receive a text message from a hacker posing as a business with whom you do business. The message may ask you to update a password, re-enter your credit card or provide sensitive information which can be used to defraud you. Or to commandeer your phone to launch bot attacks or damage your files.
Spam.
Plain old spam, an oldie but a goodie, just like the kind that attacks your PC email, will also turn up in your smartphone email or even in text messages. A lot of it is just annoying, but some of it will be unsolicited offers or smiphishing, both are designed to get your personal information for financial gain or to destroy your files.
Bluetooth.
Your Bluetooth connection can be hacked to provide access to your phone any time it’s turned on, even when it’s turned on but not in use.
What You Can Do:
In a word, beware. Be as careful in how you use your smartphone as you are when you use your PC.
- Don’t open email if you don’t know the sender. If any sender asks you to provide sensitive information, don’t. If such a request seems to be from a business you know, use your browser to go to their website or a phone to call the business directly to verify the request.
- Don’t answer text messages that ask for personal information. Again, if you think it might be legitimate, contact the purported sender by other means.
- Delete spam. Don’t answer it, ever.
- Turn off Bluetooth when you’re not using it. Also, turn it off when you are speaking or entering sensitive information into your smartphone.
- Buy protection. Just as you should always secure your PC with up-to-date Internet security software, you should protect your smartphone with smartphone security software to protect your smartphone against the latest security threats. Remember you are carrying a computer in your pocket (or purse)!
Be Smart, Beware
Beware, be careful, install security software and keep it up to date. Then you can talk, text, browse, and transact fearlessly. And live your mobile life to its fullest.