mobile security: Monitoring Tracking or Spying on a Cell Phone - 01/14/22 05:33 AM
Do you think of yourself as a spy and wonder how you can monitor another person’s cell phone? Well, we aren’t going to tell you that here, but we will give you some information about cell phone monitoring:
Tracking Cell Phones: The Legal Stuff
In most cases, it is not legal to monitor another person’s cell phone. However, and this is NOT legal advice, if the account is in your name, or if you have some type of written permission from the person owning the phone, you can track it.
Why Would a Person Monitor a Cell Phone?
There are certainly situations where it is … (4 comments)

mobile security: Keeping Your SMB Bring-Your-Own-Devices Secure - 09/10/21 09:26 AM
If you have a small or medium sized business, it is likely that you have staff who are bringing their tablets, phones, iPads, and laptops to work every day. However, all of this puts your business to risk as they can also bring malware into your network.
On top of this, any of these devices can be lost, misplaced, or stolen. Since its extremely likely that your staff are using these devices for their work, think about all of the information that could be on there about your company…and it happens because Joe in accounting left his cell phone on the counter … (8 comments)

mobile security: How to Kick Your Mobile Phone Addiction - 04/08/20 09:30 AM
Most of us know about the tricks that advertisers play when trying to get our attention. What you might not realize, however, is that our mobile phone and other digital objects are doing something similar, and you are probably falling for it every time.
One thing that designers do is use the color red for notifications. Why? Because red triggers a natural emotional response, and that makes us want to swipe or click. This also can easily make us feel “attached” to our phones, and addiction to phones and things like social media, are very real. Don’t get caught up in this; … (2 comments)

mobile security: How to Prevent your Devices From Spying on You - 02/27/20 04:13 AM
You might not realize it, but your electronic devices may be tracking you. They know what you are doing, what you are reading, and the things you like to do. In almost every case, you give these devices permission to collect this info when you start using them. Here are some tips to help you prevent your devices from spying on you:
Laptops
Macs
If you are using a macOS computer, you can limit the information you are sending to Apple by choosing the Apple menu > System Preferences > Security & Privacy. Click the “Privacy” tab, and then you will see options about … (27 comments)

mobile security: How a Wi-Fi Hacker Snoops on Your Laptop and Mobile - 01/30/20 07:42 AM
You have likely heard of the dangers of using unsecure public Wi-Fi, so you know that hackers are out there snooping. It is pretty easy to hack into a laptop or mobile device that is on a public Wi-Fi connection with no protection. Hackers can read your emails, steal passwords, and even hijack your website log ins.
Let’s imagine that you are in a local coffee shop with your laptop. All someone has to do is download a wireless network analyzer, which usually has a free trial, and with the right hardware and additional software they can often see what everyone is … (36 comments)

mobile security: SIM Swapping: What You Need to Know - 12/18/19 08:54 AM
Have you heard of SIM swapping? It’s a new trick that hackers are using to get money and mess up your life.
What is SIM Swapping?
So, what is SIM swapping? It’s when a hacker tricks your cell phone company into thinking that you have activated your SIM card on another phone. In other words, the hackers are taking your phone number and then associating it with a different SIM card. If the switch is a success, your device will be deactivated, and all of your phones, texts, data, and more will come to the hacker. This means, of course, that the hacker … (0 comments)

mobile security: Make Your Mobile a Tough Target for Thieves - 02/19/19 06:25 AM
You should definitely pay attention to your mobile phone security. Most of us don’t, which makes it easy for hackers and ID thieves to target us. Here are some tips to protect yourself from becoming a target for thieves.
Use a Passcode
One of the easiest ways to ensure that you are not a target for thieves is to use a passcode. All mobile phones have a built-in passcode option, and if you have an iPhone you can even set a passcode if it has been stolen by using the Find My iPhone feature.
Use Face ID or Touch ID
To make your iPhone even … (4 comments)

mobile security: How to Monitor a Cell Phone - 02/15/19 07:32 AM
Do you fancy yourself a spy and wondering how you can monitor someone else’s cell phone? You won’t get that information here, but there is some good info on cell phone monitoring if you keep reading:
The Legalities of Tracking Cell Phones
Generally, it is not legal to monitor a cell phone that does not belong to you. However, generally speaking, and THIS IS NOT LEGAL ADVICE, if the account is under your name or if you have written permission from the person who owns the phone, you can track it.
Why Monitor a Cell Phone?
There are some situations where it is perfectly legal, … (15 comments)

mobile security: How to Block Spammy Scammy Telemarketing Calls - 01/24/19 06:17 AM
Are you getting a lot of scammy, spammy telemarketing calls? If you are, you know how annoying they can here. Fortunately, there are some apps out there that can help. Here are a few worth looking into:
CallApp
You can use CallApp to lookup numbers, and then decide if you want to answer it or not. It collects data from users, and then gives you this information when a call comes in. You can get CallApp Crawler for Android phones.
Call Control
This app offers reverse look up, call blocking, and it can even blacklist any unwanted texts, too. It is very easy to use, … (18 comments)

mobile security: Does Your Mobile Have Spyware on It? - 10/19/18 04:45 AM
You have a mobile phone, you might think it’s pretty safe, but what you might not realize is that these devices can have spyware on them. Keep in mind, many of the “signs” listed below are everyday normal phone behaviors. But combined, might mean spyware. Here are some of the signs:
Unusual Background Noise
While common, humming, static, or other weird noises could be a sign that someone is tapping your line. Though all phones might have strange noises from time to time, you should check if there are other signs if you notice them. This is especially the case if you hear … (18 comments)

mobile security: Protect Your Mobile from Hackers - 07/19/17 07:24 AM
If you are like most of us, you probably have a password, antivirus program, and a firewall for your home computer to protect it from hackers. Are you doing the same thing for your phone?
From 2015 to 2016 malware infections on smartphones swelled by 96%, and about 71% of the smartphones out there do not have any software at all to protect them. What does that mean for you? It means the odds are against you when it comes to getting your phone hacked. Luckily, there are some things you can do to protect your mobile phone from hackers:
Update Your … (15 comments)

mobile security: Mobile SIMs Hacks Cause Concern - 09/20/16 12:15 AM
A crook can steal your identity by taking control of your wireless phone account—by pretending to be you in person at the mobile store. The villain can then buy pricey mobiles and sell them—and guess who gets the bill but not the profit.
Symptoms of Hijacked Account
Suddenly losing service Your carrier says you went to a store, upgraded a few phones, then shut down your old device. Or, the rep will straight-out ask if the problem is with your new iPhone—even though you never purchased one. You were never at the store and never authorized any account changes. If this happens … (8 comments)

mobile security: Eight ways to secure your employees' mobile devices - 02/14/16 10:25 PM
Between half and three quarters of all employees have downloaded personal apps to company tablets and phones, according to surveys. At the same time, people are increasingly using use personal phones for work purposes like email, document-sharing and the list goes on.
What does it all mean? Companies must take extra precautions to ensure that sensitive data doesn’t get into the wrong hands.
Protecting your data
Fortunately, there are several steps that a business owner can take to protect the information on employees’ mobile devices. Here are some tips:
Make sure all devices are password protected. Require all employees to use an “erase data” function … (1 comments)

mobile security: How to shop securely with a Mobile Phone - 01/14/16 10:13 PM
“You can buy things with your phone!” No kidding! But imagine what the response would have been had you made this statement in 1984: “Off your meds, eh?”
Purchasing via the smartphone may very well eclipse the popularity of shopping via laptop. And cyber thieves know this. They’re counting on you to slip up.
Never click a link inside an e-mail, even if the subject line is a warning or alert to a fabulous sale. Cyber crooks know that the small screens on mobiles can easily hide tell-tale signs of scam e-mails, people are especially vulnerable to subject lines blaring great deals. If … (3 comments)

mobile security: Want Mobile Privacy? Read - 08/26/15 11:59 PM
If you don’t want your smartphone to know more about you than you do, here are top choices, as detailed on gizmodo.com:
BlackPhone 2
The Blackphone 2 will black out the federal government from spying on you. Has a five inch handset with full HD screen (with Gorilla Glass 3 that prevents shoulder surfing). 3 GB or RAM Its Silent Circle’s PrivateOS 1.1 provides a “Spaces” UI: Data will be encrypted and compartmentalized. The “Spaces” allow you to set up distinct spaces for different types of data, including a Silent Space that’s akin to Chrome’s incognito mode. The Silent Suite allows you … (3 comments)

mobile security: Mobile Apps Failing Security Tests - 02/26/15 09:05 PM
It’s been said that there are over a million different apps for the smartphone. Well, however many may exist, know that not all of them are passing security tests with flying colors.
You may already be a user of at least several of the 25 most downloaded apps And what’s so special about the top 25? 18 of them flunked a security test that was given by McAfee Labs™ this past January. And they flunked the test four months after their developers had been notified of these vulnerabilities.
App creators’ first priority is to produce the next winning app before their competitors … (2 comments)

mobile security: Don’t Believe These 6 Mobile Security Myths - 01/23/15 09:02 PM
Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits in your pocket (most of the time). And, although we hear about breaches and security flaws in the news, it seems like a lot of us don’t think it applies to our mobile device. Here are some of the most common mobile security myths.

“Antivirus protection isn’t worth it for a smartphone.” Just because this device fits in the palm of your hand doesn’t mean it’s not worthy of as much protection as your computer. It should have comprehensive security that … (3 comments)

mobile security: The Guide to Securing Your New Tech Toys - 01/01/15 08:59 PM
Ho ho ho! It seems that this year, Santa’s sleigh was filled with technology—laptops, smartphones, gaming consoles, etc. Playing with and learning about your new tech toy is fun, but remember to secure your device. It would be a total bummer if your new toy was suddenly compromised by a virus or hacked into. Luckily, there are a few things you can do to protect your new device.

Computer/laptop
Install security software. Free software is not recommended, as it provides only basic protection and you’ll likely end up purchasing more anyways. Your security software should include:
A two-way firewall: monitors … (5 comments)

mobile security: Mobile Carriers spying on Users - 12/21/14 09:23 PM
How does my mobile phone know I like tools, electronic gadgets and tarantulas?  It keeps showing me ads for these products! Christmas is coming and my kids like bugs, big bugs.

How does it know? It’s called “supercookies”. And they aren’t yummy.
If Verizon is your carrier, that’s why. Verizon uses a “unique identifier token header” for every website the user visits. There are cookies that tag along with the user wherever they go in cyberspace. Advertisers gorge on these cookies because they tell them what products to advertise for each unique person.
You can opt out of Verizon’s program, … (2 comments)

mobile security: Card Company's boosting Payment Security with Mobile - 12/17/14 09:02 PM
Whoever thought that one day, paying with green paper would be viewed as primitive as a horse and buggy? We seem to be getting closer to that time, especially since the security of making payments via smartphone is always being improved.

One way is with fingerprint scanning. Some smartphones already have this biometric feature. But what about credit cards and biometrics? Visa is currently experimenting with biometrics, but nothing yet has been deployed to the public. Nevertheless, a credit card company trying to develop something with biometrics will likely need to get involved in the smartphone arena.
There will always … (0 comments)

 
Robert Siciliano, Realty Security and Identity Theft Expert Speaker (IDTheftSecurity.com Inc)

Robert Siciliano

Realty Security and Identity Theft Expert Speaker

Boston, MA

More about me…

IDTheftSecurity.com Inc

Address: PO Box 15145, Boston, MA, 02215

Office: (617) 329-1182



Listings

Links

Archives

RSS 2.0 Feed for this blog