BLOG
How your mobile could be hacked?
14 February, 2013

The main purpose of this article is to familiarize the reader with some widely used terms concerning mobile phone technology and hacking techniques, as well as security measures that one could take to protect the privacy of ones personal data stored in a mobile phone. It doesn’t matter whether it is Magticom, Geocell or Beeline Georgia mobile.


It’s really not necessary to be an expert in mobile technology, but to be informed, and thus cautious in order to protect oneself
from mobile phone fraud. It is crucial for every mobile phone user to know all the possibilities that are offered, along with the dangers that technological progress brings. People can learn the fundamentals of some of the most common techniques of mobile phone hacking such as cloning, eavesdropping, bluesnarfing, bluebugging , as well as familiarize themselves with the most “notorious”? mobile phone viruses, Cabir and Mabir. Let’s try to give simple answers to basic questions such as: why are mobile phones inviting targets for hackers?
There are 2 major reasons: 1)The mobile phone is always on. Rarely do we deactivate our mobile phones. 2) The personal or corporate information stored in a mobile phone. What is a clone phone?
Clone phones are mobile phones that are programmed to charge calls on other people’s mobile phone accounts. How can your mobile catch a virus?
Mobile phone viruses usually spread through Bluetooth or incoming messages.
But what can one do to protect one’s privacy? Further down, the reader can see a simply phrased, comprehensive description of security measures and recommendations. It’s the users tactics part: Use anti-virus software to monitor for viruses distributed and propagated via mobile devices; disable the Bluetooth interface while not using it; limit “roaming”; review all bills; turn the phone off; if you have confidential meeting take battery out of your mobile (Iphones, HTCes and some other brands have inbuilt batteries, in this case nothing could be done to disconnect battery and remove it). If one is not cautious, the hacker can transform a personal mobile into a handheld broadcast station, this is what a mobile phone holder should always bear in mind and implement. So the rationale is the simpler the mobile is the safer it is for you.

 

Print