{"id":19313,"date":"2016-06-27T15:34:02","date_gmt":"2016-06-27T21:34:02","guid":{"rendered":"https://www.webroot.com/blog/?p=19313"},"modified":"2018-10-05T14:45:53","modified_gmt":"2018-10-05T20:45:53","slug":"how-to-prevent-phone-hacking","status":"publish","type":"post","link":"https://www.webroot.com/blog/2016\/06\/27\/how-to-prevent-phone-hacking\/","title":{"rendered":"How to Prevent Phone Hacking and Sleep Like a Baby Again"},"content":{"rendered":"<h2>It was only a matter of time before phone hacking rose to the top of the media-driven hysteria list<\/h2>\n<p>Thanks to the rapid growth of mobile device adoption and the subsequent rapid growth in mobile threats,\u00a0phone hacking prevention is a hot topic. A\u00a0headache reserved for celebrities in the past, smartphone-infiltration\u00a0concerns have crossed the VIP vs. <em>everyone else\u00a0<\/em>blood-brain barrier and now potentially impacts anyone who owns a smartphone.<\/p>\n<p>But is this <em>really<\/em> a serious problem for us regular folks? Are our voicemail messages so interesting that someone would invade our privacy to listen in? Before we go barking up the narcissism tree, it\u2019s best to examine what phone hacking is and whether you really need to worry about it.<\/p>\n<h3>With everything I\u2019ve got going on, do I need to worry about my phone&#8217;s security?<\/h3>\n<p>This security threat can be broken down into two types:\u00a0hacking into a live conversation or into someone\u2019s voicemail, and hacking into data stored on one\u2019s smartphone. Just as the majority of abductions are carried out by a member of the abductee\u2019s family\u2014unless you go by code name POTUS or are Hugh Grant\u2014the person most likely to hack into your live conversation or voicemail will be someone that you know who has an ax to grind.<\/p>\n<p>And in today\u2019s mobile world, mobile security is a growing issue. As people increasingly store sensitive data on their <a href=\"http:\/\/www.webroot.com\/us\/en\/resources\/tips-articles\/mobile-security-for-smartphones-and-tablets-is-no-longer-optional\">mobile devices<\/a>, the opportunity to exploit privacy weaknesses becomes more tempting to unscrupulous &#8216;frenemies&#8217;, exes or the occasional stranger.<\/p>\n<p>It doesn&#8217;t help that there\u00a0is a cottage industry of software ostensibly developed for legal uses but is easily abused (password crackers aptly named &#8216;John the Ripper&#8217; and &#8216;Cain and Abel&#8217; are two examples). Opportunistic hackers can wreak havoc with data deletion or install malicious software that gathers bank account logins and confidential business emails.<\/p>\n<h3>So what\u2019s a smartphone owner to do?<\/h3>\n<p>If you want to be proactive, there are several measures you can take to protect yourself against this threat, most of which involve common sense. For example:<\/p>\n<ul>\n<li>Don\u2019t leave your phone unattended in a public place.<\/li>\n<li>Be sure to change the default password that comes with a new phone to something more complex (resist the usual &#8220;1234,&#8221; &#8220;0000&#8221; and 2580)<\/li>\n<li>Avoid using unprotected Bluetooth networks and turn off your Bluetooth when you aren\u2019t using it.<\/li>\n<li>Use a protected app to store pin numbers and credit cards, or better yet, don\u2019t store them on the phone at all.<\/li>\n<\/ul>\n<h3>Throwing the baby out with the bathwater<\/h3>\n<p>If you\u2019re still worried about your smartphone&#8217;s security, there are further steps you can take to protect yourself. However, taking things too far will defeat the purpose of having a smartphone at all.<\/p>\n<ul>\n<li>Avoid accessing important locations such as bank accounts via public Wi-Fi that may not be secure.<\/li>\n<li>Turn off your auto complete feature so critical personal data isn\u2019t stored on the phone and must be re-entered every time you need it.<\/li>\n<li>Regularly delete your browsing history, cookies and cache so your virtual footprint is not available for prying eyes.<\/li>\n<li>If you have an iPhone, you can enable &#8216;Find My iPhone&#8217; in your settings, and it will locate your phone if you misplace it before the hackers can lay their hands\u00a0on it.<\/li>\n<li>Use a security app that increases protection. For Android owners, Webroot offers the all-in-one<a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/mobile\"> SecureAnywhere Mobile\u00a0app<\/a> that provides antivirus protection and allows you to remotely locate, lock and wipe your phone in the event you lose track of it.<\/li>\n<\/ul>\n<p>Remember\u2014if the thought of your smartphone getting breached\u00a0has you tossing and turning at night, you can just turn the phone off, remove the battery and hide it under your pillow for some sweet lithium-ion induced dreams.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It was only a matter of time before phone hacking rose to the top of the media-driven hysteria list Thanks to the rapid growth of mobile device adoption and the subsequent rapid growth in mobile threats,\u00a0phone hacking prevention is a hot topic. A\u00a0headache reserved for celebrities in the past, smartphone-infiltration\u00a0concerns have crossed the VIP vs. [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":18037,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[2985],"tags":[],"yst_prominent_words":[3775,5239,3769,3781,4463,3765,5237,3763,3523,3757,3755,3779,3759,3479,3767,3467,3773,5241,3771,3785],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/19313"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=19313"}],"version-history":[{"count":6,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/19313\/revisions"}],"predecessor-version":[{"id":25985,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/19313\/revisions\/25985"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/18037"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=19313"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=19313"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=19313"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=19313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}