Cell Phone Hacking

Back to Article
Back to Article

Cell Phone Hacking

Nicole L., Staff Writer

Hang on for a minute...we're trying to find some more stories you might like.


Email This Story






Today, our cellphones are used for more than making calls and sending texts. Our entire lives are carried around in small pocket devices that contain all of our personal information. This only makes us more susceptible to the risk of cell phone hacking. Cell Phone hacking is getting more and more relevant as we turn to technology more often in our daily lives. We can manage our bank accounts, save passwords, and store personal information in other applications. And stalkers are always one step ahead of us, taking advantage of our lack of computer security.

     According to The National Center for Victims of Crime, in a total of 6.6 million people affected by stalking each year, 1 in 4 people are affected by technology. In this ever expanding age of technology, we rely more and more technology for daily tasks. Everywhere we go, we carry a portable computer in our pockets that is capable of doing everything from managing our bank accounts to taking photos. However, they also store huge amounts of sensitive data such as private messages, banking information, and photos. This makes cellphones a target to stalkers “Full access to someone’s phone is essentially full access to someone’s mind,” says Eva Galperin. She’s the director of cybersecurity at the Electronic Frontier Foundation. 

 

     A good way to prevent this is to turn off the “Big Three”. This includes Bluetooth, WiFi, and location services. In crowded public spaces, a device with Bluetooth or WiFi enabled can appear on anyone else’s computer, as someone waits to get the most information they can out of passing pedestrians. Another tactic often used is the free public WiFi network. Once you log in their network, the network owner can gain control of your connected device. The same goes for Bluetooth connection; if someone tries to connect to your device and you click OK without reading the description, someone could connect to your laptop with bad intentions. 

Some other tips for securing your cell phone:

 

 

  •  Don’t connect to public WiFi  as many public networks have very little security if any at all. In fact, 32% of hacked mobile devices are linked to unsecure public networks.
  • Install antivirus protection to protect your cell phone from malware. Hackers send links via text that install malware once you click them; then they can steal your private information.
  • Use a password on your cell phone. Not everybody uses passwords, but should to increase cell phone security.
  • Be careful what you download from the AppStore. Some apps look innocent, but are really just virus programs in disguise. An unsuspecting user might download an app and unintentionally download malware to their device.