mobile security: SIM Swapping: What You Need to Know - 12/18/19 08:54 AM
Have you heard of SIM swapping? It’s a new trick that hackers are using to get money and mess up your life.
What is SIM Swapping?
So, what is SIM swapping? It’s when a hacker tricks your cell phone company into thinking that you have activated your SIM card on another phone. In other words, the hackers are taking your phone number and then associating it with a different SIM card. If the switch is a success, your device will be deactivated, and all of your phones, texts, data, and more will come to the hacker. This means, of course, that the hacker … (0 comments)

mobile security: Make Your Mobile a Tough Target for Thieves - 02/19/19 06:25 AM
You should definitely pay attention to your mobile phone security. Most of us don’t, which makes it easy for hackers and ID thieves to target us. Here are some tips to protect yourself from becoming a target for thieves.
Use a Passcode
One of the easiest ways to ensure that you are not a target for thieves is to use a passcode. All mobile phones have a built-in passcode option, and if you have an iPhone you can even set a passcode if it has been stolen by using the Find My iPhone feature.
Use Face ID or Touch ID
To make your iPhone even … (4 comments)

mobile security: How to Monitor a Cell Phone - 02/15/19 07:32 AM
Do you fancy yourself a spy and wondering how you can monitor someone else’s cell phone? You won’t get that information here, but there is some good info on cell phone monitoring if you keep reading:
The Legalities of Tracking Cell Phones
Generally, it is not legal to monitor a cell phone that does not belong to you. However, generally speaking, and THIS IS NOT LEGAL ADVICE, if the account is under your name or if you have written permission from the person who owns the phone, you can track it.
Why Monitor a Cell Phone?
There are some situations where it is perfectly legal, … (15 comments)

mobile security: How to Block Spammy Scammy Telemarketing Calls - 01/24/19 06:17 AM
Are you getting a lot of scammy, spammy telemarketing calls? If you are, you know how annoying they can here. Fortunately, there are some apps out there that can help. Here are a few worth looking into:
CallApp
You can use CallApp to lookup numbers, and then decide if you want to answer it or not. It collects data from users, and then gives you this information when a call comes in. You can get CallApp Crawler for Android phones.
Call Control
This app offers reverse look up, call blocking, and it can even blacklist any unwanted texts, too. It is very easy to use, … (18 comments)

mobile security: Does Your Mobile Have Spyware on It? - 10/19/18 04:45 AM
You have a mobile phone, you might think it’s pretty safe, but what you might not realize is that these devices can have spyware on them. Keep in mind, many of the “signs” listed below are everyday normal phone behaviors. But combined, might mean spyware. Here are some of the signs:
Unusual Background Noise
While common, humming, static, or other weird noises could be a sign that someone is tapping your line. Though all phones might have strange noises from time to time, you should check if there are other signs if you notice them. This is especially the case if you hear … (18 comments)

mobile security: Protect Your Mobile from Hackers - 07/19/17 07:24 AM
If you are like most of us, you probably have a password, antivirus program, and a firewall for your home computer to protect it from hackers. Are you doing the same thing for your phone?
From 2015 to 2016 malware infections on smartphones swelled by 96%, and about 71% of the smartphones out there do not have any software at all to protect them. What does that mean for you? It means the odds are against you when it comes to getting your phone hacked. Luckily, there are some things you can do to protect your mobile phone from hackers:
Update Your … (15 comments)

mobile security: Mobile SIMs Hacks Cause Concern - 09/20/16 12:15 AM
A crook can steal your identity by taking control of your wireless phone account—by pretending to be you in person at the mobile store. The villain can then buy pricey mobiles and sell them—and guess who gets the bill but not the profit.
Symptoms of Hijacked Account
Suddenly losing service Your carrier says you went to a store, upgraded a few phones, then shut down your old device. Or, the rep will straight-out ask if the problem is with your new iPhone—even though you never purchased one. You were never at the store and never authorized any account changes. If this happens … (8 comments)

mobile security: Eight ways to secure your employees' mobile devices - 02/14/16 10:25 PM
Between half and three quarters of all employees have downloaded personal apps to company tablets and phones, according to surveys. At the same time, people are increasingly using use personal phones for work purposes like email, document-sharing and the list goes on.
What does it all mean? Companies must take extra precautions to ensure that sensitive data doesn’t get into the wrong hands.
Protecting your data
Fortunately, there are several steps that a business owner can take to protect the information on employees’ mobile devices. Here are some tips:
Make sure all devices are password protected. Require all employees to use an “erase data” function … (1 comments)

mobile security: How to shop securely with a Mobile Phone - 01/14/16 10:13 PM
“You can buy things with your phone!” No kidding! But imagine what the response would have been had you made this statement in 1984: “Off your meds, eh?”
Purchasing via the smartphone may very well eclipse the popularity of shopping via laptop. And cyber thieves know this. They’re counting on you to slip up.
Never click a link inside an e-mail, even if the subject line is a warning or alert to a fabulous sale. Cyber crooks know that the small screens on mobiles can easily hide tell-tale signs of scam e-mails, people are especially vulnerable to subject lines blaring great deals. If … (3 comments)

mobile security: Want Mobile Privacy? Read - 08/26/15 11:59 PM
If you don’t want your smartphone to know more about you than you do, here are top choices, as detailed on gizmodo.com:
BlackPhone 2
The Blackphone 2 will black out the federal government from spying on you. Has a five inch handset with full HD screen (with Gorilla Glass 3 that prevents shoulder surfing). 3 GB or RAM Its Silent Circle’s PrivateOS 1.1 provides a “Spaces” UI: Data will be encrypted and compartmentalized. The “Spaces” allow you to set up distinct spaces for different types of data, including a Silent Space that’s akin to Chrome’s incognito mode. The Silent Suite allows you … (3 comments)

mobile security: Mobile Apps Failing Security Tests - 02/26/15 09:05 PM
It’s been said that there are over a million different apps for the smartphone. Well, however many may exist, know that not all of them are passing security tests with flying colors.
You may already be a user of at least several of the 25 most downloaded apps And what’s so special about the top 25? 18 of them flunked a security test that was given by McAfee Labs™ this past January. And they flunked the test four months after their developers had been notified of these vulnerabilities.
App creators’ first priority is to produce the next winning app before their competitors … (2 comments)

mobile security: Don’t Believe These 6 Mobile Security Myths - 01/23/15 09:02 PM
Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits in your pocket (most of the time). And, although we hear about breaches and security flaws in the news, it seems like a lot of us don’t think it applies to our mobile device. Here are some of the most common mobile security myths.

“Antivirus protection isn’t worth it for a smartphone.” Just because this device fits in the palm of your hand doesn’t mean it’s not worthy of as much protection as your computer. It should have comprehensive security that … (3 comments)

mobile security: The Guide to Securing Your New Tech Toys - 01/01/15 08:59 PM
Ho ho ho! It seems that this year, Santa’s sleigh was filled with technology—laptops, smartphones, gaming consoles, etc. Playing with and learning about your new tech toy is fun, but remember to secure your device. It would be a total bummer if your new toy was suddenly compromised by a virus or hacked into. Luckily, there are a few things you can do to protect your new device.

Computer/laptop
Install security software. Free software is not recommended, as it provides only basic protection and you’ll likely end up purchasing more anyways. Your security software should include:
A two-way firewall: monitors … (5 comments)

mobile security: Mobile Carriers spying on Users - 12/21/14 09:23 PM
How does my mobile phone know I like tools, electronic gadgets and tarantulas?  It keeps showing me ads for these products! Christmas is coming and my kids like bugs, big bugs.

How does it know? It’s called “supercookies”. And they aren’t yummy.
If Verizon is your carrier, that’s why. Verizon uses a “unique identifier token header” for every website the user visits. There are cookies that tag along with the user wherever they go in cyberspace. Advertisers gorge on these cookies because they tell them what products to advertise for each unique person.
You can opt out of Verizon’s program, … (2 comments)

mobile security: Card Company's boosting Payment Security with Mobile - 12/17/14 09:02 PM
Whoever thought that one day, paying with green paper would be viewed as primitive as a horse and buggy? We seem to be getting closer to that time, especially since the security of making payments via smartphone is always being improved.

One way is with fingerprint scanning. Some smartphones already have this biometric feature. But what about credit cards and biometrics? Visa is currently experimenting with biometrics, but nothing yet has been deployed to the public. Nevertheless, a credit card company trying to develop something with biometrics will likely need to get involved in the smartphone arena.
There will always … (0 comments)

mobile security: Mobile Employees Are a Security Risk - 11/30/14 02:51 AM
Not too long ago, the office computer filled an entire room. Now, it fills the palms of one-third of employees—those workers who use only the mobile device for their jobs. Security, however, lags behind in keeping up with this growing trend. This is the BYOD generation: bring your own device (to work).

IT departments need to keep one step ahead of this fast-growing trend. It’s here to stay, and one reason is because it’s responsible for significantly pumping up productivity. Employers love this. More productivity = higher profits. You’d think that some of these increased profits would be reinvested in … (2 comments)

mobile security: What’s Your Click IQ? - 10/14/14 11:33 PM
The recent celebrity photo hacks are an unfortunate reminder of how devastating or embarrassing it can be to have your data compromised.  But celebrities are not the only ones getting hacked. Cybercriminals aren’t choosy—they’ll send malicious texts, emails, and website links to Jennifer Lawrence and your grandma. And while the celebrity hacks are more publicized, the fact is, every day, hundreds of ordinary people are falling prey to phishing scams.
So how can you protect yourself from these cybercriminals? The best defense is actually you.
Many of these scams involve a similar thing—the click. So if you learn how to click … (3 comments)

mobile security: Researchers say your Mobile Carrier’s Network isn’t all that Secure - 09/07/14 11:11 PM
Gee, even the tools that update your smartphone’s operating system over the air have holes that hackers can slip into.
It’s estimated that as many as two billion handsets are vulnerable, and in some instances, security patches haven’t even been released.
The open mobile alliance device management (OMA-DM) protocol is used by around a hundred smartphone companies to release software updates and conduct network administration. And that’s what they say where the problem lies.
A hacker must know the handset’s distinct international mobile station equipment identity (IMEI) number, plus a secret token, to take remote control. It’s not difficult to obtain … (2 comments)

mobile security: United Airlines Passport Scanning Mobile App: is it safe? - 08/13/14 11:17 PM
How much easier international travel is for United Airlines fliers: They can now use their iOS or Android device to scan their passports.

If a customer checks in with United’s mobile application for international flights, they can access the passport-scanning feature. One can check in within 24 hours of departure. Fliers will get an option to confirm their stored passport data or to scan their passport.
If a customer chooses the scan, the app will use the smartphone’s camera to capture passport information. United says this is “similar to a mobile banking deposit.” The flier can retrieve the boarding pass … (1 comments)

mobile security: What is an Advanced Persistent Threat? - 07/06/14 11:54 PM
If you’ve ever seen a movie where the bad guys are using ongoing, invasive hacking to spy on their “enemy,” you have some familiarity with an advanced persistent threat (APT).

This term usually refers to an attack carried out by a group that targets a specific entity using malware and other sophisticated techniques to exploit vulnerabilities in the target’s systems. It is often done for intelligence gathering with political, financial or business motives.
For example, an APT aimed at a corporation could take the form of Internet-based malware that is used to access company systems, or a physical infection, such as … (2 comments)

 
Robert Siciliano, Realty Security and Identity Theft Expert Speaker (IDTheftSecurity.com Inc) Rainmaker large

Robert Siciliano

Realty Security and Identity Theft Expert Speaker

Boston, MA

More about me…

IDTheftSecurity.com Inc

Address: PO Box 15145, Boston, MA, 02215

Office: (617) 329-1182

Email Me



Listings

Links

Archives

RSS 2.0 Feed for this blog