Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

Protecting yourself from Cell Phone hacks….
Security Beacon ^ | 7/21/11 | Security Beacon

Posted on 07/22/2011 10:31:22 AM PDT by 4yourcountry

The UK news establishment is in full retreat with news suggesting reporters hacked officials cell phones to extract private data about a range of personal issues. Even if you are not a government official being targeted by tabloid news, criminals, competitors and other bad people, these folks may have or now will leverage these same techniques to take advantage of you. Before everyone gets all worked up about downloading some new anti-virus software or such for your cell phones, here are some key tips you should take right now...

(Excerpt) Read more at securitybeacon.com ...


TOPICS: Business/Economy; Computers/Internet; Conspiracy; Government
KEYWORDS: foxnews; hack

1 posted on 07/22/2011 10:31:29 AM PDT by 4yourcountry
[ Post Reply | Private Reply | View Replies]

To: 4yourcountry
here are some key tips you should take right now...

Where?

Why not post them here?

2 posted on 07/22/2011 10:33:56 AM PDT by humblegunner
[ Post Reply | Private Reply | To 1 | View Replies]

To: 4yourcountry
If you are outside the US, everything you say on your smartphone, transmit wireless via email, text, or view on a web page is being tracked by the host government. Everything.

Smart, but I wouldn't have included the limiting clause "If you are outside the US,".

3 posted on 07/22/2011 10:45:37 AM PDT by KarlInOhio (The Dems demanding shared sacrifice are like Aztec priests doing it while cutting out my heart.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: humblegunner

Basic Security (Average User)

1.Never, ever, ever leave a detailed voice main about a sensitive issue.

2.Implement a password/pin to access your cell phone/smart phone – the type that requires you to log into your cell phone if left unattended. Use the longest password you can. Use the longest PIN that you can.

3.Set your voicemail so that you must enter a pin number even if you are calling in from your cell phone.

4.Check your cell phone plan to be sure the “Forward Messages” function has not been turned on somehow, redirecting your messages to some bad guy.

5.Assume everything you say or do on a cell phone is being recorded.

6.Keep your OS up-to-date and apply latest patches as soon as they are available. In both iphone tracking and DroidDream malware an OS issue was exploited. Both Apple and Google quickly fixed the issues and released patches.

Advanced (Business user with liability for protecting data)

1.On your business related phone, go a step further and say in your voice mail message “Please do not leave any sensitive information in your voice mail”.

2.Use Secure protocols when setting up your POP/IMAP on your Smartphone (often referred to as TLS). This encrypts the data moving from your phone to the server.

3.If you use GMAIL, turn on 2-Factor authentication. This creates a specific password for each of your devices. If your smart phone goes missing, you can kill access just for that device without disrupting everything else.

4.Set your smartphone data security encryption (the data stored on your data cards/phone) to high. If someone steals your phone they may try to take out the memory card to get at your data, encryption slows them down.

5.Do not download applications unless you are absolutely sure of their origin (i.e. they come from a name brand company whose reputation will be destroyed if they steal data)

6.For companies with multiple cell phones or enterprise tools, limit users ability to load software (one thing that blackberry does better than anyone else is to lock down cell phone functions through its policy engine)

7.Turn off the location based functions. Turn them back on only when you need them (which frankly is not that often).

8.Have two cell phones – one for general use, and the other for important/secure matters.

9.Get a google voice or other voip type account that lets you automatically forward calls to you cell phone. Then only give out your google voice number. If a hacker knows your cell phone number they can hack your online account or call the cell phone provider, and sometimes change parameters of your account to give them access to your data.

10.Be sure you have setup remote find/remote wipe on your cell phone/PDA. Backup your cell phone. Then test the remote wipe function so you are sure the remote wipe function works. Reload your phone from the backup.

11.Use the designated application for accessing your email – either an email client, or an application from that specific vendor. Do not log on to a web page to get mail via a smartphone. It is very easy for the bad guys to create a site that looks like google mail/yahoo mail to trick you into providing your user name/password.

Paranoid (Under major attack/threat)

1.If you are outside the US, everything you say on your smartphone, transmit wireless via email, text, or view on a web page is being tracked by the host government. Everything.

2.Understand that there are a range of simple “Snoopware” programs that can be downloaded onto your cell phone, sometimes even remotely. These programs can record you even when you are not on the phone.

3.Disable “password save” function on your cell phone applications (Facebook, Twitter, etc). Type them in when you need them. Better yet, if totally under attack, delete all these applications


4 posted on 07/22/2011 10:47:36 AM PDT by GGpaX4DumpedTea (I am a tea party descendant - steeped in the Constitutional legacy handed down by the Founders)
[ Post Reply | Private Reply | To 2 | View Replies]

To: 4yourcountry
6.Keep your OS up-to-date and apply latest patches as soon as they are available. In both iphone tracking and DroidDream malware an OS issue was exploited. Both Apple and Google quickly fixed the issues and released patches.

How does one go about doing this.......for Android?

5 posted on 07/22/2011 10:47:45 AM PDT by OB1kNOb (Financial Repression.......it answers a lot of questions.....read about it on FinancialSense.com.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GGpaX4DumpedTea

Thank you.
I don’t know why that was so difficult for the poster of the thread.


6 posted on 07/22/2011 10:58:51 AM PDT by humblegunner
[ Post Reply | Private Reply | To 4 | View Replies]

To: 4yourcountry

“Bring home milk, bread, eggs, toilet paper, cat ear medicine, don’t stay out too late” Yeah, terrible secrets on my voice mail.


7 posted on 07/22/2011 11:14:27 AM PDT by enraged
[ Post Reply | Private Reply | To 1 | View Replies]

To: humblegunner

It was difficult for the OP because he was trying to drive customers to his commercial web site.


8 posted on 07/22/2011 11:43:10 AM PDT by wrench
[ Post Reply | Private Reply | To 6 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson