Smart phones demand smart privacy and security practices (part 2)
Smart phones infected with malware can be used to invade your privacy, monitor your activities, track your whereabouts, steal your identity and drain your bank account. While phishing and malware infections (viruses, spyware, worms and Trojan horses) are traditionally facilitated through email on PCs, these threats are transmitted to smart phones through email and texting (SMS text messaging).
Experts say cell phones just don’t offer much protection. "Cell phones are not like computers," security consultant Michael Fjetland told MyFoxDetroit . "There’s no firewall, there’s very little in the way of anti-virus software so once they make that connection, basically, it’s an open door."
The spyware programs are inexpensive, but they require someone to physically access your phone in order to install the program. Oftentimes spouses, lovers, parents and co-workers are the victims. James Atkinson, a spy-phone expert at Granite Island Group, a security consultancy in Gloucester, Mass., estimates the number of tapped phones in the U.S. is 3 percent .
IS YOUR CELL PHONE TAPPED?
Here are some clues:
5) Phone is unusually warm even though you haven’t been using it– could indicate unauthorized transmissions.
4) Battery life drops dramatically, for no reason– could indicate surreptitious communication.
3) Screen flashes on and off, without cause– could indicate an incoming spy call.
2) Monthly bill shows an unwarranted spike in SMS or data transmission activity– could indicate your phone is being accessed without your knowledge.
1) Phone receives nonsensical text messages (for example, <*#62><123456789>)– could indicate botched attempts to send system commands.