Secure Mobile Phone

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 17 May 2013

Your Smartphone - The Quickest Route to Your Bank Account

Posted on 10:42 by Unknown
Many consumers simply don't realize how vulnerable their Androids, iPhones and other devices can be. 

An April study by the Federal Reserve Bank of Atlanta said threats are proliferating, ranging from "phishing" -- where consumers click a phony email or text message and are tricked into handing over personal information -- to consumers' reluctance to use security protections they normally have on home computers, like a password...

Organized crime operations see smartphones as the most vulnerable entry point into the electronic financial system, according to the Federal Reserve...

Vikram Thakur, principal security response manager for security software giant Symantec, said attackers can get complete control of a phone simply by getting people to click on a link. Without actually having the phone in their hands, the hackers can access messages, phone calls and personal information. (more)

Spybusters Tip #734: 
• Password protect your phone. Keep it turned on.
• Don't click on anything 'iffy'.
• Keep Bluetooth and Wi-Fi turned off unless needed.
• Avoid sensitive transaction over public Wi-Fi hot spots.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in cell phone, Hack, survey, Tips | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • The Ratters - men who spy on women through their webcams
    The woman is visible from thousands of miles away on a hacker's computer.   The hacker has infected her machine with a remote administr...
  • Google Glass Hacked - Everything You See and Hear Transmitted to Anyone
    Google's Glass wearable computer have been hacked so video and audio can be transmitted online to anyone. Hackers have been able to remo...
  • This Week in Spy News
    The chairman of Stow College in Glasgow has resigned after a row over a recorded conversation on a device branded a "spy-pen". ( m...
  • CONTEST (ENDED) - Who Is This Man?
    We have a winner! Congratulations!! Answer below. Clues... • Born 1897. • Died 1973. • Expert wiretapper.  • Good high speed driver.  • Shar...
  • The US classification system
    (Updated: October 12, 2013) Top Level Telecommunications often involve information that has to be kept secret. To ensure that, governments h...
  • When Paranoids Collide they Blow the Whistle on Tea Kettles
    Customs agents in Russia found tea kettles and irons bugged with tiny Spyware chips that exploit WiFi connections , reports a local news out...
  • "1984" Gets a New Look
    via creativity-online.com ... You can't judge a book by its cover, but there's no denying that a thoughtful, bold packaging can mak...
  • Watergate's Next Watergate
    A history professor hopes that a federal court's recent order to release long-sealed Watergate documents will shed light on the motivati...
  • Laser Beam Eavesdropping - In the News Again
    Since the 1970's, stories about laser listeners have periodically popped up in the news. The common thread is their magical ability to e...
  • Spybusters Tip # 723 - Be Smart - Use a Dumb Phone to Thwart Spyware
    Sometimes you just need a dumb phone that can't spy on you.   inKlien Global's tiny phone 6.5mm Ultra Thin AIEK M3 Cool Card Cell Ph...

Categories

  • advice
  • aerial
  • amateur
  • Android
  • App
  • Apple
  • art
  • biometric
  • BlackBerry
  • blackmail
  • Bluetooth
  • Boeing
  • book
  • business
  • BYOD
  • CALEA
  • cartoon
  • cautionary tale
  • CCTV
  • cell phone
  • CIA
  • Classification
  • Clothing
  • computer
  • contest
  • counterespionage
  • Darwin
  • data
  • detection
  • drone
  • dumb
  • eavesdropping
  • email
  • employee
  • encryption
  • ERII
  • espionage
  • extortionography
  • FBI
  • fiber-optic
  • find
  • food
  • FREE
  • fun
  • FutureWatch
  • General Dynamics
  • Germany
  • Gold Phone
  • government
  • GPS
  • GSM
  • Hack
  • historical
  • Hotline
  • humor
  • IAPSC
  • IMCPB
  • Infrared
  • Internet
  • ISAF
  • Israel
  • IST
  • IT
  • just coincidence?
  • KDM
  • keystroke
  • KGB
  • Kremlin
  • laser
  • law
  • lawsuit
  • leaks
  • malware
  • marketing
  • MI6
  • mind reading
  • miscellaneous
  • mores
  • movie
  • nature
  • Netherlands
  • North Korea
  • NSA
  • Obama
  • optics
  • OSS
  • password
  • PI
  • police
  • political
  • poll
  • POTUS
  • PRISM
  • privacy
  • product
  • quiz
  • quote
  • Ra-parents
  • Ray-Gun
  • recording
  • Red Phone
  • religion
  • RFID
  • Russia
  • sabotage
  • satire
  • scam
  • shredder
  • Situation Room
  • social engineering
  • software
  • sports
  • Spy Museum
  • spy school
  • spybot
  • spycam
  • spyware
  • SpyWarn
  • statistics
  • STE
  • steganography
  • STU-II
  • STU-III
  • surveillance
  • survey
  • telephone
  • TEMPEST
  • Tips
  • toy
  • tracking
  • trade secret
  • TSCM
  • Twitter
  • UMTS
  • USA
  • USB
  • USSR
  • Vatican
  • VoIP
  • voyeurism
  • Watergate
  • weird
  • White House
  • Wi-Fi
  • Wireless
  • wiretapping
  • X-Ray Vision

Blog Archive

  • ▼  2013 (455)
    • ►  November (47)
    • ►  October (53)
    • ►  September (31)
    • ►  August (50)
    • ►  July (50)
    • ►  June (47)
    • ▼  May (35)
      • On Paranoia...
      • Australia IT Security - More Godfather logic?
      • How to Stop The China IT Leach Syndrome – Two Ideas
      • U.S. IT Security - Schizophrenia, Bipolar Disorder...
      • The Other Train Spotters and the Drones Who Will C...
      • Australia - Report on Smartphone Spyware & Hacking
      • Where Spy Shops Shop - Know What You Are Up Against
      • Laser Beam Eavesdropping - The Trinidad and Tobago...
      • NYC Detective Dials "H" for Hacker... or, The Miss...
      • StopAStalker App ($5.00) - FREE for next 24 Hours
      • General Dynamics secures commercial smartphones fo...
      • Every Wonder How Spyware Gets on Phones? Watch the...
      • Big Data - The End of Privacy. The End of Chance.
      • Federal 1st Circuit Court of Appeals - Police can'...
      • Fight Back Against Stalkers - New iPhone App
      • Your Smartphone - The Quickest Route to Your Bank ...
      • Bug Eyed Drone Used 368 iPhone 4S Cameras
      • Cautionary Tale - Employees Bug Boss for Promotions
      • Retailers sniffing cell phone Wi-Fi signals at the...
      • Spybuster Tip # 845 - Don't Plug Your iPhone/Pad i...
      • Big Week for Spy News - Seems Everyone is Being Ca...
      • Private Investigators Convene in Atlantic City Nex...
      • CONTEST (ENDED) - Who Is This Man?
      • Privacy Journal Book - Compilation of State and Fe...
      • The NSA Spy's Guide to Searching the Internet - DE...
      • Government Surveillance Ratchets Up
      • Emergency Wristwatch for Spies... and Maybe Your CEO
      • FutureWatch - The Latest in TSCM-ware
      • New York Times - Quote of the Day - Tapped Out On ...
      • Secrets of The Dead - Uncensored recordings of Naz...
      • Jam Da Cam - Stick it to Da Hacker Man
      • Today: Hackers 2, FBI 0
      • Google Glass Hacked - Everything You See and Hear ...
      • Computer Expert Hacked Neighbors’ Wi-Fi - Spied on...
      • "When spycam hits your eye, like a big pizza pie, ...
    • ►  April (40)
    • ►  March (29)
    • ►  February (33)
    • ►  January (40)
  • ►  2012 (84)
    • ►  December (33)
    • ►  November (33)
    • ►  October (12)
    • ►  June (2)
    • ►  May (2)
    • ►  February (1)
    • ►  January (1)
Powered by Blogger.

About Me

Unknown
View my complete profile