Tag Archive for Mobile phone

6 Things to Never Save on Your Mobile Phone

6 Things to Never Save on Your Mobile PhoneTwo out of every three people are addicted to their mobile phone. The average user touches their smart phone 2,617 times a day. It is no wonder that most people view their cell phone as detailed summary of their personal life. This convenience comes at a price. A recent from report from Kensington found that 70 million smartphones are lost each year, with only 7 percent recovered.

dangerous to your privacy and your walletThere are things you should never store in your cell phone. Readers Digest says that keeping valuable info on your mobile is dangerous to your privacy and your wallet. You open yourself up to an invasion of privacy, identity theft and straight-up theft. Here are some things you should not keep on your phone.

Your passwords

If you keep your passwords on your mobile, you are putting you privacy at risk. Even if you keep them in a note, a document or even in auto-fill on your mobile, you’re putting your data at risk. The article says if you lose your phone, someone might easily see your “cheat sheet.”  Because everyone snoops through mobile phones. Even if you store your passwords on your mobile phone they can end up stored in the cloud, still putting your accounts at risk. Instead consider a password manager such as Keeper, or LastPass. That way all of your passwords can be accessed by you using one strong master password.

Your face and fingerprints

don’t use biometrics to open your phoneIf you really want to keep your cell phone secure, don’t use biometrics to open your phone (or any of its apps or accounts). There are many reasons why biometrics like fingerprints don’t make you more secure. Facial recognition apps are more dangerous that using a password. The author says the simple fact is that a phone that requires a password to unlock it requires more steps to unlock. That makes the mobile phone more secure.

Your private photos and videos

You may have cleaned up your Facebook account, but what about your phone? What photos and videos do you store on your phone? If you have photos you wouldn’t want your spouse, children, or boss to see, then you shouldn’t store those photos on your smartphone according to the article. Media stored on your phone is saved in the cloud outside of your control.

Your naughty photos are one problem. Another is any photos containing private information. While photos of credit cards and ID can help you keep track of “what’s in your wallet,” they can also leave your information vulnerable to hacking. Again the photos are stored on the cloud. As with your naughty photos, Readers Digest suggests you store your pictures ID on a PC that only you have access to in a password-protected album.

Anything on your work phone

Do not save anything personal on an employer-provided mobileDo not save anything personal on an employer-provided mobile. There’s no such thing as a free lunch. The phone you were issued by your employer comes at a steep price: your privacy. You should have no expectation of privacy for anything you do on that phone. For your personal life the article recommends using a separate phone and phone number. One budget-minded option is a burner phone.

Your online bank account

Digital banking in the US is expected to grow from 197 million users in March 2021 to 217 million by 2025. But the convenience online banking affords—the ability to bank anywhere, anytime— comes at a cost: your privacy. Carrying your bank account with you on your phone means that you’re risking losing control of it in the event you lose your phone…or even lose track of an old phone that you no longer use they warn.

To manage the risk, you might consider avoiding doing your online banking on your phone. Instead, do it on a computer that never leaves your home. If you find that you simply must take your online banking with you wherever you go, just be sure to use a strong, unique password to unlock your banking app.

Your home address

Storing your home address in navigation app like Waze or Google Maps makes getting home from anywhere super-easy. But it can also leave you vulnerable. If a thief ends up with your phone, they can simply click on “home,” or “work,” and see what you’ve stored, and pay you a visit.

If you lose your mobile phone that are some steps you need to take according to Consumer Reports. As soon as you get your new mobile phone.

Use strong password protection on your mobile phone

Use strong password protectionThis is your first and strongest line of defense. You need a strong password, because one that’s easy to guess could unlock your phone and allow someone to override the biometric safeguards.

Skip the simple 4-digit PIN and instead create a strong password that contains a string of at least eight characters that include some combination of letters, numbers, and special characters that don’t form recognizable words or phrases, especially those that could be associated with you.

Password protection comes with another safeguard according to Consumer Reports. After several unsuccessful tries to enter a passcode, some phones will lock your device for a short period of time. This slows down attempts to access your phone. There’s also a setting on the latest Android phones that automatically erases all of your personal data after 10 unsuccessful log in attempts. Here’s how to activate it. Go to:

  • Settings | Lock Screen | Secure Lock Settings | and toggle the Auto Factory Reset option to switch it on. (The labels may vary slightly on other Android models.)

Enable location tracking

You must turn on the global positioning settings (GPS) in order to find a missing phone on a map. To enable this setting on an Android phone go to:

  • Settings | Security | Find My Device and toggle Find My Device.

Back up your photos and videos

Consider using a carrier-neutral service to back up your mobileConsider using a carrier-neutral service to back up your mobile. Apple’s iCloud or Android’s Google Drive may make it easier to retrieve your memories should your next phone be from a different carrier. Phone carriers, phone makers, and operating systems also offer free over-the-air backup for photos, settings, and more. These options can limit you if you select a new carrier for your next mobile phone.

Write down your phone’s unique ID number

Smartphones have a unique serial number known as an IMEI (International Mobile Equipment Identity) or MEID (Mobile Equipment Identifier). Unlike other information stored on the phone’s removable SIM card, these numbers are etched into its circuits and are difficult to alter. Your carrier already has this number and can use it to put the phone on a missing phone list. Some police departments ask for either of these numbers when you report a stolen phone. With the numbers they’ll be able to return a phone to you if it’s recovered. To find your phone’s unique IMEI or MEID number, use any of the following steps:

  • Dial *#06# from your phone. The number may pop up on your screen.
  • On an Android phone go to: Settings | About Phone. The number should be on that screen.

After the phone is gone, the sooner you act, the better your chances of retrieving your phone and securing your data. Here are key actions to take according to CR.

Seek and (possibly) destroy your mobile phone

erase the data on yourphoneIt is important that the minute you learn your phone is missing, you send it commands you think are appropriate. Time is of the essence because these next steps requires your phone to be on and have some battery life left.

As soon as possible, call or text your phone from another device. That might be all it takes if your phone is just misplaced nearby.

Then log on to your Find My Phone service from a secure device. For an Android phone, go to Google’s Find My Device in a browser. Use the service to make your phone play a sound. You can also lock the screen and display a message for someone who finds your phone. An honest person may come across your device and notify you via the contact info on the screen. If you think the bad guys have your phone, you can erase the data on it using Find My Device.

Report the Loss to Your Service Provider

Inform your mobile carrier that your phone has been lost or stolen. It can suspend service to prevent anyone from using the device on its network. They may also mark the phone as unusable even on a new carrier or with a different SIM card. Note that your device will still be usable over WiFi. You can notify your provider by going to one of its stores, calling, or logging on to its website.

  • AT&T: Call 800-331-0500 or go to AT&T’s Suspend page.
  • T-Mobile: Call 800-937-8997 or go to My T-Mobile, and in the My Line section click on your device name to find the Report Lost or Stolen option.
  • Verizon: Call 800-922-0204 or go to the Suspend or Reconnect Service page in My Verizon and follow the prompts.

Change Your Important Passwords

Once you realize your phone is in danger, go to a secure PC,  log in to every account you had on your phone (banking, shopping, email, etc.) and change your passwords. Start with your email account. Then change the financial and shopping accounts that have your credit card on file, such as Amazon or your bank. Next move on to social networks. If you’ve set up a password manager, this task will be easy.

Report the Loss to the Police and File an Insurance Claim

Notify the police. This not only launches an official recovery attempt but also helps speed up the process of making an insurance claim (if your covered). You might also need a police report to dispute fraudulent credit card charges, and some credit card issuers will reimburse you for a stolen phone.

Wipe your mobile phone anyway

malicious app or spywareIf you recover your phone You never know what malicious app or spyware someone may have installed while the phone was out of your hands. To be on the safe side, reset the phone to factory settings. If you see an option to erase everything, make sure you select it. Before you nuke the phone, check your backups to make sure that you have copies of all the photos and videos that were on your phone.  On an Android phone, go to:

  • Settings | System | Advanced | Reset Options | Erase All Data (factory reset).

 

How you can help Ukraine!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

 

Michigan Phone Spying Stalled

Michigan Phone Spying StalledWarrantless cell-phone spying legislation has stalled in the Michigan House. MLive reports that House Bill 4006 has been pulled from the agenda for the second time in as many weeks. In a flash of rationality, Gideon D’Assandro, a spokesperson for the Republican majority, said new questions about jurisdiction and proposed immunity for wireless providers have popped up. D’Assandro told MLive, “… There’s still questions.

privacy proponentsThe legislation, sponsored by Republican Rep. Kurt Heise of Plymouth Township, has prompted push back from some conservative lawmakers and privacy proponents in the state Legislature after advancing out of committee last month. “It’s been a heated discussion, a passionate discussion, just about the civil liberty issues that are all wrapped up in this,” said Rep. Cindy Gamrat, R-Plainwell.

My concern is … we’re setting precedent authorizing government to access our technology devices, such as phones or computers or GPS in cars. Where do you end up drawing the line?

State Rep. Todd Courser, R-Lapeer, said he understands the value that location information could offer in some emergencies but made clear that he could not vote for the bill in its current form. He told MLive,

I think we also need to make sure we’re giving people the constitutional protections that are supposed to be afforded by our founding fathers.

In typical goobermental double-speak, Heise, the sponsor of the bill to legalize NSA-style phone snooping in Michigan told MLive that allowing warrantless access to private citizens’ phones could actually strengthen civil liberty protections. Heise even told MLive he does not think that notifications for cell phone owners who the State of Michigan snooped is necessary.

I am not a crook

Warrant-less access to private citizens phones could actually strengthen civil liberty protections

Of course, law enforcement groups and Verizon (VZ) indicated support for the proposal to gain even more access to citizens’ private information. As now written, the snooping does not require a warrant. All a police officer needs to access a private citizen’s phone records, is to have a note signed by a supervisor.

rb-

Get hold of your House Rep (contact info here) and tell them to keep NSA-style warrant-less phone spying out of Michigan and vote this bill down.

Stop the slide down the slippery slope, despite what the Koch Bros. and ALEC want.

Of course, the cops can just call their friends at Homeland Security and get the data and end-run the Constitution.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Smartphone Screen Kill Germs

Smartphone Screen Kill GermsCell phones are filthy. I wrote about the portable petri dishes back in November of 2012. CNET found that 75% of American’s use their mobile phones in the bathroom to make calls, text, and play with apps. Your mobile carries more germs than a toilet seat. There is speculation that they have even spread Ebola. Now, thankfully Corning has your back.

Gorilla Glass kills germs all by itselfEric Limernewest revision of Gorilla Glass is not only more resilient, it also kills pesky germs all by itself. Gorilla Glass, covers 1.5 billion mobile phones worldwide, including all Apple (AAPL) iPhones.

Corning discussed its upcoming display tech at the MIT Mobile Technology Summit. The anti-microbial coating being used on the new glass can kill virtually all nasty microbes on the screen’s surface over a course of two hours. It’s not instantaneous, but it’s way better than having a pocket petri dish Mr. Limer observed.

Signe Brewster at GigaOM wrote that during the presentation, Corning senior vice president Jeff Evenson reported that the company is working on glass that kills viruses and germs — even the drug-resistant variety. GigaOM says that the VP noted a study that found smartphones carry more microbes than the average public toilet. He displayed how the glass kills microbes over time with slides depicting them as bright green dots. After two hours, the antimicrobial glass had a million times fewer bacteria than standard phone glass. Corning’s Evenson said

“You’re eating your sandwich at your desk. Your smartphone rings. You answer it. You complete the call, put your smartphone down and you go back to eating your sandwich with the same hand. Which piece of glass do you want on that device?”

Gizmodo reports that Corning said the antimicrobial displays will be available sometime in the next two years.

Corning antimicrobial glass kills germs

And that’s not all, either. GigaOM’s Brewster also reports that Corning is developing a new transparency treatment that will make the next revision of Gorilla Glass tens of times more transparent than purified water. This should result in seeing your phone in broad daylight is about to get way easier.

 rb-

Until Corning releases Gorilla Glass 3, washing your hands is a good idea and licking your iPhone screen is probably a bad idea. In order to clean your iPhone, Apple recommends:

Wash your handsTo clean iPhone, unplug all cables and turn off iPhone (press and hold the Sleep/Wake button, and then slide the onscreen slider). Use a soft, slightly damp, lint-free cloth. Avoid getting moisture in openings. Don’t use window cleaners, household cleaners, aerosol sprays, solvents, alcohol, ammonia, or abrasives to clean your iPhone. The front and back glass surfaces have an oleophobic coating. To remove fingerprints, simply wipe these surfaces with a soft, lint-free cloth. This coating’s ability to repel oil will diminish over time with normal usage, and rubbing the screen with an abrasive material will further diminish its effect and may scratch the glass.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Voice Mail Open to Hacking

Voice Mail Open to HackingMobile carriers ‘proven’ to be open to surveillance and customer ID theft. The New York Times reports on a study by Karsten Nohl, a Berlin hacker and mobile security specialist who found that many mobile operators provided poor protection of voice mail from hacks.

Original mobile phoneIn a study of 31 mobile operators in Europe, Morocco, and Thailand, Mr. Nohl, found that he could hack into mobile conversations and text messages. The NYT says he used an inexpensive, seven-year-old Motorola mobile phone and free decryption software available on the internet.

He tested each mobile operator more than 100 times and ranked the quality of their defenses. He presented the findings at a recent Chaos Computer Club convention. While his research focused mostly on Europe, Mr. Nohl, a German with a computer science doctorate from the University of Virginia, said the level of security provided by network operators in the US was on a par with that provided by European operators, meaning there was room for improvement.

Voice mailIn Asia, the Middle East, and Latin America, mobile security varies widely and can be much lower. Operators in India and China, Mr. Nohl said, encrypt digital traffic poorly or not at all, either to contain operating costs or to allow government censors unfettered access to communications.

In 2009 Mr. Nohl, who runs Security Research Labs in Berlin, published the algorithms used to encrypt voice and data conversations on GSM digital networks, used in Europe and elsewhere.

Cell phne towerAccording to the NYT article, Mr. Nohl focused on deciphering the predictable, standard electronic ”conversations” that take place between a mobile phone and a mobile network at the start of each call. Typically, Nohl said, as many as 40 packets of coded information are sent back and forth, many just simple commands like, ”I have a call for you,” or ”Wait.” Most operators vary little from this set-up procedure, which he said allowed him to use hacking software to make high-speed, educated guesses to decipher the complex algorithmic keys networks use to encrypt transmissions. (rb- seems like the same problem that WEP has)

Once he derived this key, he said, he could intercept voice and data conversations by impersonating another user to listen to the user’s voice-mail messages or make calls or send text messages on the user’s mobile accounts.

Software patchThe author claims operators could easily end this vulnerability in the GSM system, which is found in older 2G networks used by almost every cellphone, including smartphones, with a simple software patch. His research found that only two operators, T-Mobile in Germany and Swisscom in Switzerland, used this enhanced security measure, which involves adding a random digit to the end of each set-up command to thwart decoding. For example, ”I have a call for you 4.”

This is a major vulnerability in most networks we tested, and the irony is that it costs very little, if nothing, to repair,” he said.

really old mobile phonePhilip Lieberman, CEO of Lieberman Software, a LA company that sells identity management software to large businesses and the US government, said much of the digital technology that protects the privacy of mobile calls was developed in the 1980s and 1990s and is ripe for attack.

The researcher found that Telefonica’s O2 network in the Czech Republic, Belgacom Proximus in Belgium, and Orange Switzerland provided the least security preventing the impersonation and use of another’s mobile account details for calling, texting, or other purposes. T-Mobile Slovakia, T-Mobile Germany, and SFR in France had the best.

least effective in guarding against the trackingThe study reports that T-Mobile Slovakia and the Moroccan operators Wana and Medi Telecom were least effective in guarding against the tracking of a cellphone user’s geographic position through the Internet and global positioning satellites had the weakest safeguards; Vodafone Italy, T-Mobile Germany, and Vodafone Germany had the best.

Protect your voice mail

The author concludes that voice mail security does not seem to be a priority for mobile phone networks. Hence, users should be proactive about their privacy. Anyone’s phone can be hacked, if it was easy for Rupert Murdoch’s journalists, it would be easy for anyone to do…

In order to prevent your mobile voice mail from being hacked set an unlock password on your phone. Experts urge you to avoid the following  popular passwords on mobile phones:

  • 1234
  • 0000
  • 2580 (the middle column of numbers on a telephone keypad)
  • 1111
  • 5555Monkey typing
  • 5683 (Spells “LOVE”)
  • 0852 (the middle column of numbers on a telephone keypad in reverse)
  • 2222
  • 1212
  • 1998

Set a secure voice mail password. You shouldn’t need to memorize it as your phone will store the information. In most cases you should be able to do this manually, but if not contact your mobile network.

Maintaining completely different passwords for all of your various telephone and online accounts is vital, if slightly tricky to do.

Change your passwords regularly.

Hang on to your cell phone. Voice mail hacking can be done from your own phone if the device is left unsecured and there is no unlock PIN setup.

Related articles

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Your Smartphone Can Kill

Your Smartphone Can KillWe all love our smartphones. But did you know that your phone can kill you? And not only texting while driving can kill you and other people. A man in Uganda reportedly contracted Ebola from a mobile phone. Reports say he stole the smartphone from a quarantined ward of a hospital, near the site of a recent Ebola outbreak.

Next time you come down with the flu or Ebola, blame your cell phone. According to the London DailyMail, researchers have discovered there are more bacteria on the average smartphone than you will find in a toilet.

Tests at the University of Arizona by microbiologist Charles Gerba found there was up to 10 times the amount of bugs that can cause nausea, stomach problems, or even death on cell phones than are present in a lavatory.

The expert explains that germs are spread by phones that are often passed between people but are never cleaned which allows the germs to keep on building up. The University of Arizona researcher says the bugs get on a phone because it is so close to our hands and mouths. When somebody lets a friend or a stranger use their smartphone their bacteria easily gets on the device too.

Add to this frenzy of activity that germs thrive in warm places. Not only does your smartphone generate its own heat, but it also gets some help from your own body heat by spending time in your hands and next to your mouth.

ProGerms on your cellfessor Gerba added that because mobile devices are electronic some people are reticent about cleaning them. He says that phones are just not part of our cleaning routine whereas we should think about giving them a wipe with an antibacterial substance now and then.

In order to clean your iPhone, Apple (AAPL) says:

  1. Unplug all cables and turn off iPhone (press and hold the Sleep/Wake button, and then slide the onscreen slider).
  2. Use a soft, slightly damp, lint-free cloth. Avoid getting moisture in openings.
  3. Don’t use window cleaners, household cleaners, aerosol sprays, solvents, alcohol, ammonia, or abrasives to clean your iPhone. The front and back glass surfaces have an oleophobic coating.
  4. To remove fingerprints, simply wipe these surfaces with a soft, lint-free cloth. The ability of this coating to repel oil will diminish over time with normal usage, and rubbing the screen with an abrasive material will further diminish its effect and may scratch the glass.

rb-

Yick… I also wrote about the filthiness of keyboards here. Clean your mobile phone before it kills you!

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.